This is really good for encrypted content such as a hard drive, password vault or gpg key

  • unlogic@lemmy.zip
    link
    fedilink
    arrow-up
    5
    ·
    13 days ago

    If you haven’t got any dice handy you can use random.org to generate the numbers for you. Or even select a set of words from the list

    • kevincox@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      13 days ago

      select a set of words from the list

      I would be very careful doing this. It is very easy to introduce significant bias. Humans are terrible at picking random numbers.

      If you can’t find dice I would recommend:

      1. Having a computer pick random items for you.
      2. Renumber the list into binary and flip a coin 12 times for each word. (This results in a slightly shorter word list but should be string enough).
  • kbal@fedia.io
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    13 days ago
    #!/bin/bash 
    
    head -$[$SRANDOM % `wc -l /usr/share/dict/words | cut -f1 -d' '`] /usr/share/dict/words | tail -1
    
  • catalog3115@lemmy.world
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    13 days ago

    Doesn’t using a particular wordlist limits choice, gives attackers a wordlist to generate the password from

    • MajorSauce@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      13 days ago

      Even a “traditional” password would have a “list” that attackers could know (all the possible characters that can be used in a password), now compare this set of ±150 characters with the set of possible words that can be used (probably close to 250k per language if you take out some similarities).

      Even with only 4 words, the number of possibilities is astounding.

    • laughterlaughter@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      13 days ago

      Technically, yes. But the article already mentioned the amount of effort for the brute force to succeed (that is, practically never, if the phrase is truly random.)

      But anyway. With regular passwords, the attackers already have a list: the alphabet plus numbers and symbols. Not really that different.

    • AHemlocksLie@lemmy.zip
      link
      fedilink
      arrow-up
      1
      ·
      13 days ago

      It does limit choice, but so long as you aren’t retaining the generation list somewhere an attacker can find it, how are they to know your list? As long as your list is incorporating less common words, your attacker can’t even simplify the problem by focusing on the most common words. Just one rare word can expand the list they need to use by tens of thousands of words.

    • ShortN0te@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      13 days ago

      Yes, but when the list is long enough and you have enough words, it is to difficult to guess.

      Think about it. The list of all possible characters is also known, still with enough length and randomness it becomes too difficult to guess too.