Wait, it's 2022 and TechRepublic is recommending that people generate their passwords on someone else's website? Who's editing this stuff?!

@nw Putting the dictionary in dictionary attack... also make sure to hire a password inspector to tell you if you have chosen a good password.

@nw In most cases those are entirely generated client-side in JS.

The problem is non-programmers can't really verify that, but if you *are* sure, it's safe.

@nw why tho, it's not even something that's difficult to code.

@nw @alcinnz I don't see any problem or security risk in using online diceware generator. There are also many post generation modification that you can do before putting that password into use.

@Mehrad @nw @alcinnz

Imagine a website that ask the URL you want a password for, and the username you will use. Knowing that, we can generate a very strong password for you.

But that's not all. We put its hash in the blockchain too, associated to a NFT that *you* possess. This way, no one would be allowed to use your password. Best security *ever*!

I'd better start to code this site before anyone steal my idea. 😂


That's a nice joke comment 😂 then why bother coding it, use password123 for everything, or to look cool, `echo "password123" | md5sum` 🤪

@nw @alcinnz

@nw "If you don't have a password manager..." then bloody get one. 🤦

@nw business model: Give us your data & email & TelNr & bank data & Insurance no. ... We will calculate the optimal password for you and that will be the only correct and secure one that you will use everywhere 🙃

Oops that will be quite a funny grav that you can market.

@nw tr -dc "[:graph:]" < /dev/urandom | head -c 50

Sign in to participate in the conversation

InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

We have a Getting Started Guide here: