Recently read the minimum acceptable password should be 600 characters. How's this for generation?
something like:
1. create some entropy
2. get some random bytes, convert to ascii
dd if=/dev/random bs=1c count=600 | base64 | tee -a pw
3. there's your random password, use as input to the passwd program
fail? total newfag need your suggestions. what's the best length.
and don't forget to strip non permitted characters
>>59754320
Or just use KeePass
>>59754352
Kill yourself, you dumb fucking shit stain.
>>59754352
sounds like disinfo trojanhorse.
>>59754352
>made by autists in their free time instead of paid experts
>source code open to everyone so exploits are easy to find
>exploits rarely get reported due to open-source with no finders fee
>rarely if ever security audits
HMM, YEAH, SEEMS SAFE.
>>59754456
>"paid experts"
You know, I always wondered why security companies get breaches until I started CS. The dumbest fucker in my group (guy who got lowest fucking grades possible) managed to snag a job in an interview because he said he liked "programming" even though his grades were fucking shit and he is useless.
This fucking idiot couldn't even write his resumè, but they skipped all that stuff because it was a "speed interview" where the entire class got to go to their companies HQ. Turns out they just ignored every academic achievement and hired purely based on the interview (which had no technical people there, only the HR ladies) and if the candidate said if they liked programming or not.
It's so fucking stupid. I literally lost all faith in security companies after seeing that happen.
Literally the dumbest fucker, a guy who doesn't even know what the fuck HTTPS is, got the job at a security company without any technical knowledge and getting carried through school. Literally no other company would touch him so he fucking lucked out maximum.
>>59754320
If you want 512 bits and you can only type in ascii,you could just use characters 0 to F.
64 of such characters,if each is randomly selected,should have the same entropy as a string of 512 random bits.
>>59754567
Shit, I meant 128 characters, not 64.
>>59754456
>source code open to everyone so exploits are easy to find
That's on purpose.All details about secure protocols and crypto primitives is made public so people can find any weaknesses.
This is mentioned in every Bruce Schneier book.
>>59754456
>source code open to everyone so exploits are easy to find
Do you seriously actually believe that security through obscurity is a good idea?
>>59754320
Just use a passphrase and be done with it.