Just a basic programmer living in California

  • 0 Posts
  • 10 Comments
Joined 4 months ago
cake
Cake day: February 23rd, 2024

help-circle





  • Yes, I use passphrases for stuff like my password manager, my computer login, and my disk encryption. For my login (which I type a lot) it’s four words; for occasional stuff like disk encryption it’s six. I’m sold on the argument that a passphrase is way easier to memorize compared to a comparably-secure random password.

    The number of possible passphrases is the number of words in the dictionary you use to generate passphrases raised to the power of the number of words in your passphrase (assuming a small chance of reusing the same word in a passphrase). I use this command to generate a random phrase using my stock OS word list:

    grep -v '[^a-z]' $WORDLIST | shuf --random-source=/dev/urandom | head -n5 | paste -sd ' '
    

    grep -v '[^a-z]' $WORDLIST filters out words with apostrophes or other weirdness. On my system the filtered list is 77,866 words.

    For four words, 77,866 ^ 4 ≈ 3.7 × 10^19 possible passphrases.

    Compare that to randomly-generated passwords. I’ll assume that random lowercase & uppercase letters, numbers, and symbols add up to 46 characters. The number of combinations is 46^n where n is the length of the password. A four-word passphrase is the same order of magnitude as secure as a 12-character password, which has about 9 × 10^19 possible combinations.

    I’m sure that if you make up your own passphrases instead of randomly generating them then the security is much lower.


  • I find ngrok useful enough to pay for. When I want to demo some software I can run it locally and set up a temporary tunnel. When I used to have a VPS I would do this with SSH port forwarding, but I’m told that tunneling TCP in TCP can lead to some weirdness.

    I used to have a dyndns subscription to get a stable domain name for my home router. It’s kind of another way to do the same thing - instead of a tunnel I could forward a part.