Episode 4 – Cracking Passwords, Not Bones (Passwords & Multi-Factor Authentication)
Password requires a minimum of eight (8) characters in length, at least one (1) Uppercase letter, (1) lowercase letter, (1) digit, (1) special character… but why? Is it really that easy to break in? Find out that the answer is yes, and what you can do to keep safe and organized.
Sources:
How easily some passwords can be cracked:
- Ars Technica, 2012 December 9, ’25-GPU cluster cracks every standard Windows password in <6 hours’
- Ars Technica, 2012 August 20, ‘Why passwords have never been weaker—and crackers have never been stronger’
SHA CPU Instructions:
LastPass Vulnerability:
(Why I would still say use LastPass if you don’t wish to set up a local password bank):
KeePass:
- KeePass Website
- European Commission’s Free and Open Source Software Auditing (EU-FOSSA 1) [Security Audit for KeePass Source Code]
SMS 2FA Weaknesses:
- Sucuri, 2020 January 1, ‘Why 2FA SMS is a Bad Idea’
- Wired, 2016 June 6, ‘So Hey You Should Stop Using Texts for Two-Factor Authentication’
Hardware Keys/Tokens:
U2F:
How TOTP Works:
—
Website: https://breadnet.xyz/podcast/
Instagram: https://instagram.com/techthoughtspodcast/
Opening Music: Another World by BETTOGH