2025/04/19

Newest at the top

2025-04-19 21:20:31 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) (Ping timeout: 265 seconds)
2025-04-19 21:19:44 +0200fp(~Thunderbi@hof1.kyla.fi) fp
2025-04-19 21:19:24 +0200fp(~Thunderbi@hof1.kyla.fi) (Remote host closed the connection)
2025-04-19 21:19:22 +0200 <geekosaur> also I keep finding the occasional site which either doesn't let you use a password manager at all without copy-paste or only works with one of them
2025-04-19 21:18:45 +0200 <geekosaur> in my case it's just being too lazy to sit down and weed through a couple thousand passwords spread over both, remove the extinct ones (lots of accounts/passwords from the 2000s are dead now, either because the site went away or they changed authentication systems), and duplicate or move the remainder
2025-04-19 21:15:15 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) merijn
2025-04-19 21:11:20 +0200Square3(~Square@user/square) (Ping timeout: 265 seconds)
2025-04-19 21:10:51 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) (Ping timeout: 265 seconds)
2025-04-19 21:10:17 +0200 <EvanR> triple redundancy
2025-04-19 21:09:48 +0200 <EvanR> having multiple password managers is key to reduce the damage of having one of them compromised
2025-04-19 21:09:01 +0200 <monochrom> hierarchical password managers like hierarchical epoll instances >:)
2025-04-19 21:08:37 +0200 <EvanR> there's so many password managers I need a password manager manager
2025-04-19 21:08:01 +0200peterbecich(~Thunderbi@syn-047-229-123-186.res.spectrum.com) peterbecich
2025-04-19 21:07:58 +0200petrichor(~znc-user@user/petrichor) petrichor
2025-04-19 21:06:00 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) merijn
2025-04-19 21:00:42 +0200caconym(~caconym@user/caconym) caconym
2025-04-19 21:00:01 +0200caconym(~caconym@user/caconym) (Quit: bye)
2025-04-19 20:59:25 +0200 <geekosaur> I have two secure passwords memorized, the rest my password manager handles. (Both of those two, naturally, are password managers or have password manager functionality)
2025-04-19 20:58:36 +0200notdabs(~Owner@2600:1700:69cf:9000:9d19:fe87:a9a8:9d05) (Quit: Leaving)
2025-04-19 20:55:30 +0200fp(~Thunderbi@hof1.kyla.fi) fp
2025-04-19 20:53:54 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) (Ping timeout: 276 seconds)
2025-04-19 20:53:01 +0200jacopovalanzano(~jacopoval@cpc151911-cove17-2-0-cust105.3-1.cable.virginm.net)
2025-04-19 20:49:14 +0200Core6459(~rosco@183.171.73.119) (Ping timeout: 260 seconds)
2025-04-19 20:49:11 +0200Sgeo(~Sgeo@user/sgeo) Sgeo
2025-04-19 20:48:53 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) merijn
2025-04-19 20:39:33 +0200aforemny_(~aforemny@i59F4C452.versanet.de) (Ping timeout: 272 seconds)
2025-04-19 20:39:08 +0200aforemny(~aforemny@2001:9e8:6cee:1800:c0f9:494c:b1de:77a) aforemny
2025-04-19 20:35:34 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) (Ping timeout: 265 seconds)
2025-04-19 20:30:43 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) merijn
2025-04-19 20:30:42 +0200machinedgod(~machinedg@d108-173-18-100.abhsia.telus.net) (Ping timeout: 252 seconds)
2025-04-19 20:17:21 +0200xal(~xal@mx1.xal.systems) xal
2025-04-19 20:14:52 +0200xal(~xal@mx1.xal.systems) (Client Quit)
2025-04-19 20:14:45 +0200xal(~xal@mx1.xal.systems) xal
2025-04-19 20:14:36 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) (Ping timeout: 268 seconds)
2025-04-19 20:14:16 +0200xal(~xal@mx1.xal.systems) (Quit: bye)
2025-04-19 20:13:01 +0200 <monochrom> Truly random letters are extremely hard to type in. I know because my friends tried. They had a Netflix account with a random-letter password, and of course normally one benefits from a password manager that enters it for you. One day we went to an AirBnB house and tried to log in on that TV manually. Immediately we were like we regretted secure passwords, it's so hard to enter.
2025-04-19 20:09:47 +0200euleritian(~euleritia@p5b00a7f4.dip0.t-ipconnect.de)
2025-04-19 20:09:45 +0200 <haskellbridge> <Liamzee> 20 years ago, overheard password, apparently less than 24 bits for an ibank password
2025-04-19 20:09:42 +0200 <monochrom> Also a lot of places.
2025-04-19 20:09:34 +0200euleritian(~euleritia@p200300d40f34c000a27007a219b5eb60.dip0.t-ipconnect.de) (Remote host closed the connection)
2025-04-19 20:09:22 +0200euleritian(~euleritia@p200300d40f34c000a27007a219b5eb60.dip0.t-ipconnect.de)
2025-04-19 20:09:07 +0200 <haskellbridge> <Liamzee> but iirc 128 bits was apparently a standard at microsoft a decade ago
2025-04-19 20:08:29 +0200 <haskellbridge> <Liamzee> the alternative is 20 random characters and letters, of course
2025-04-19 20:08:26 +0200 <monochrom> I don't have better memories. I resort to storing a ton of passwords in a file, but I keep it encrypted with one single long password, and I just remember that one. Or rather, finger-muscle-memory really.
2025-04-19 20:08:07 +0200euleritian(~euleritia@dynamic-176-006-138-003.176.6.pool.telefonica.de) (Remote host closed the connection)
2025-04-19 20:06:51 +0200 <haskellbridge> <Liamzee> then generating the passwords manually is painful
2025-04-19 20:06:46 +0200euleritian(~euleritia@dynamic-176-006-138-003.176.6.pool.telefonica.de)
2025-04-19 20:06:37 +0200 <haskellbridge> <Liamzee> the problem with diceware is, to reach 128 bits of entropy, you need 8 words, which, i guess you folks have better memories
2025-04-19 20:06:09 +0200euleritian(~euleritia@dynamic-176-006-138-003.176.6.pool.telefonica.de) (Remote host closed the connection)
2025-04-19 20:05:10 +0200merijn(~merijn@host-vr.cgnat-g.v4.dfn.nl) merijn