One Out of Every 142 Passwords is '123456' (zdnet.com) 71
In one of the biggest password re-use studies of its kind, an analysis of more than one billion leaked credentials has discovered that one out of every 142 passwords is the classic "123456" string. From a report: The study, carried out last month by computer engineering student Ata Hakcil, analyzed username and password combinations that leaked online after data breaches at various companies. These "data dumps" have been around for more than half a decade, and have been piling up as new companies are getting hacked. The data dumps are easily available online, on sites like GitHub or GitLab, or freely distributed via hacking forums and file-sharing portals. Over the years, tech companies have been collecting these data dumps. For example, Google, Microsoft, and Apple, have collected leaked credentials to create in-house alert systems that warn users when they're utilizing a "weak" or "common" password.
I've got the same combination on my luggage (Score:5, Funny)
Re: (Score:2)
I'll show them I'll change my password to 142356
Re: (Score:2)
Pfff, weak. Mine goes to 11
Re: (Score:2)
Re: (Score:2)
Don't be mean. The reality is, for one out of every 142 people, all they can manage with a password is 123456, such is life, they are born that way. Suck it up, the average IQ is 100 so that means 50% of the population are less than 100 and for them computers are really hard and the lower they go, the much (and I do mean much) harder it becomes. Computers are complicated, as is the software, as is using them properly, just the way it is.
Re: (Score:2)
You should have left it at the manufacturers 000000, now it's out of spec.
Re: (Score:2)
If 00000000 was good enough for the DOD... (Score:2)
For 20 years the launch code for US nuclear missiles was 00000000. The DOD didn't have a problem, so why should I?
https://arstechnica.com/tech-p... [arstechnica.com]
Re: (Score:3)
the Cold War mindset: accidentally starting a nuclear war is less critical than not being prepared to retaliate.
those were weird days that I feel no nostalgia for.
Re: (Score:2)
Thanks, I needed this.
Re: (Score:2)
https://www.youtube.com/watch?... [youtube.com]
Bad password (Score:2)
Re: (Score:2)
dah dah dah dah dah dit dah dit dit dit dit dit dah dit dah dit dah dah dah dah dit dit dit dah dah dah dah dit dit dah dit dit dah dit dah dah dah dit dah dah dit dah dit dit dit dit dit dit dit dah dah dah dit dah dit dah dit dah dah dit dit dit dah dit dah dit dah dah
Re: (Score:2)
Requires two hands to type. asdfasdf is a good one.
Re: (Score:2)
It's not that bad (Score:2)
123456 is also one out of every 1,000,000 passwords.
But does it matter? (Score:1)
Surely it only matters if those passwords are being used on accounts that matter to the user. If it's a typical "oh, I have to create an account to comment here, which I'll then immediately forget about ah... username hfashf873124 location: vatican birth date: 1/1/2000 Password: 123456." then what's the problem?
Re: (Score:2)
Why is there a blank space in your subject line?
Intentional openness? (Score:4, Interesting)
Just like some folks make their wifi password an easy one to guess/share in an apartment, I think a lot of folks just don't want to close the door on someone getting through on a lot of things.
I know I've created a fairly large amount of pure junk accounts just because companies forced me to create an account to see how a product worked.
That's the same reason that folks doing surveys of people have to filter out a fairly large number of fictional names from their results.
People reject security measures they see no personal benefits to - they especially reject the effort needed to maintain those security systems.
Forcing them to make the effort makes them put that same effort into actively breaking those systems in clever ways.
That's why the real expense of a security system is often really giving people a stake in it worth the effort of maintaining it.
It's also why a large portion of folks really hate most forms DRM, on a game they spent money on.
It's only the large portions of systems that reject weak passwords that have 123456 as rare as it is - I wonder how many times it has to be auto-rejected?
Ryan Fenton
Re: (Score:2)
123456 is a good password for when you don't really want a password because you're more worried about accidentally locking out yourself than any need to lock out others.
Re: (Score:2)
Absolutely, and websites subject to being hacked are probably also the ones you wouldn't care much about security.
Re: (Score:2)
Re:Intentional openness? (Score:4, Interesting)
there was a fun movement for a while in spanish speaking circles called the 'lalala movement'. the philosophy: if any site required registration you'd try lalala/lalala or lalala/lalala99 combinations. if they didn't work you'd register one of those with a discardable email account, making the site available to the next initiate in the movement.
it even worked for a while :)
Re: (Score:2)
In the 1990s, you could login to many sites with cyberpunk / cyberpunk.
141.99999 (Score:3)
Re: (Score:2)
Problem are the crap websites, not the user (Score:2)
I would totally use a password like 123456 for most social accounts that did not have any credit card associated with them, including, but not limited to:
Facebook
Twitter
free pandora account
roll20
discord
reddit
instagram
and of course, Slashdot
The passwords on these accounts are mostly for the benefit of the CORPORATION, not the user.
Re: (Score:2)
Wow, I secured my Facebook with a U2F key. Not a thing on it that would be embarrassing to me if it got out, but the hell I would want someone logging in and putting something embarrassing on it.
Re: (Score:2)
Yeah, I just signed into GP's Pandora and deleted all their stations in favor of Justin Bieber.
Re: (Score:2)
I would totally use a password like 123456 for most social accounts that did not have any credit card associated with them, including, but not limited to:
Facebook Twitter Slashdot
The passwords on these accounts are mostly for the benefit of the CORPORATION, not the user.
So what are your user names for Facebook and Twitter so that I can use your accounts to send some death threats to the President and maybe post some kiddy porn?
That's good. Not every site requires real password (Score:2)
There are lots of stupid sites that require you to log in, and I use a stupid password for them. Like the NYTimes to view 5 articles a month. I don't care if anyone hacks my account, because it's just a throwaway.
Banks, email -- I use LastPass + 2-factor. But lots of junk sites I'll use the same junk password.
Re: (Score:2)
They don't really care so much. They got you to give them your e-mail address as one step in activating the account. That's what they were after.
Haha (Score:3)
Passwords should have multiple characters and not exist in dictionaries (such as Webster) that's why I've set my slashdot password to Slashdot1! so nobody can guess it.
I checked the dictionary personally.
Re: (Score:2)
Funny and insightful. Password policies are so ridiculous. You don't like my k18do5 password, but Password1! is ok ? Then I'll do nothing important on your platform as I just don't trust your security engineers. That's why Paypal and Ebay have always been a no go for me.
Re: (Score:3)
haha! JohnTheRipper does dictionaries plus permutations.
(insert the Princess Bride's character Inigo Montoya saying: "Unless the enemy has studied his Agrippa which I have.")
I know you're joking, and likely know, but it's worth noting for the n00bs:
Right after JtR or other engines try all 100,000 common words and passwords, they go to work on slight variations: Backwards. Different capitalization. 2-word combinations. Leetspeak and other character substitutions (like 0's for Os, !'s for 1, L or I, et
Fractions (Score:2)
870 out of every 123456 passwords is 123456.
Think about what makes a password rare (Score:3)
Back in the early days of the internet, I used the "Bender stop trying to destroy the world" approach, and set a password to something that nobody would ever associate with me.
But when I first saw a list of common passwords that shouldn't be used, sure enough "baseball" was on the list -- and I changed that one immediately.
So consider what everyone else's passwords are, not just yours.
Re: (Score:2)
Should've gone with "antiquing".
Consider the sources (Score:4, Insightful)
The passwords were collected from sites that did not think it important to keep the passwords in a safe manner, so it is a good chance the users felt the same.
Use of salted hashed passwords has been standard fare for a LONG time. If you're even a little serious about things, a dump of your passwords would be pretty much unusable. No one would be able to identify which passwords were most common, because "123456" would hash differently for each.
Re: (Score:2)
This list of companies that don't take security seriously includes Equifax (at least as of 2017), and for all you know it includes your bank. I don't think you can assume that users know which sites are not serious about security and only use crap passwords on crap sites.
Also even the easiest password I have (which probably dates to 1995) is better than 123456.
I would be surprised that with salted hashes (Score:2)
One out of every 142 passwords is (Score:3)
I'm a bit surprised... (Score:2)
It's still depressingly common to find sites that freak out if you try to use spaces or certain special characters in passwords; but enforcement of at least 'alphanumeric' is something I would have assumed would have become a baseline some
Re: (Score:2)
Re: (Score:2)
I work in physical security, and am appalled by the security policies of much of the hardware in my industry. One of the largest manufacturers of security cameras has a hard-coded admin user named 'system' with an unchangeable password of 12345. Some don't allow numbers or special characters, some are limited to only 6 or 8 characters, some don't allow view-only accounts. Only Axis and Pelco force installers to change the root password at first login, and both of them will allow you to change it back to
confidential (Score:2)
Ha, I have a very strong password, 37 random characters sourced from /dev/urandom. I have it taped to my Monitor with another sign over the stiky saying "Company Confidential"
Per our security standards, no one is suppose to look at confidential items unless they have access first. So I am very safe
Website inconsistencies (Score:2)
Part of the issue I have with using secure passwords is most sites have different and arbitrary password requirements.
One site may say "only symbols allowed are !,$#@" while others allow all symbols. This forces me to make different passwords for different sites, and try to remember all of them.
So, for less critical accounts, I use simple passwords. I don't trust password managers either.
Re: (Score:2)
Part of the issue I have with using secure passwords is most sites have different and arbitrary password requirements.
One site may say "only symbols allowed are !,$#@" while others allow all symbols. This forces me to make different passwords for different sites, and try to remember all of them.
So, for less critical accounts, I use simple passwords. I don't trust password managers either.
A password manager is definitely very handy. I have passwords that I don't even know but a quick copy/paste and I'm logged in.
Re: (Score:3)
As far as I'm concerned, if you know that my password doesn't have a !, ^, $, A, a, and 1 in it, how do I know that you're not storing it in plaintext? What I put into the password field is my business, and my concern. All you need is the mangled garbage of a salted and hashed text string.
Re: (Score:1)
Re: (Score:2)
the answer is 42! (Score:2)
more like 1 out of 142 passwords is 42
123456 (Score:1)
Not surprising with so many accounts (Score:2)
I have at last check 107 different passwords for different sites.
Some of those sites do not require any security at all. For instance if some equipment vendor wants me to log in before I can see their data sheets, why would I bother with a secure password? I don't happen to use 123456 but I use something extremely easy to remember because it doesn't matter at all if someone guesses it.
For my bank accounts I use pw0n3d
I could use a phone password manager, but if my phone fails, I am forked.
Re: (Score:2)
P@$$word1 will usually work for a nice throwaway. It's easy to type and remember.
Or, as one of the great early minds of Unix said (Score:2)
1234 (Score:2)
I had a factory replacement of the control unit for my eBike. When the replacement unit came back, I couldn't be bothered to look up how to change the password. It's 1234 - but physical security is the key, as I'm sure there is a factory wipe method that is easy enough to remove this password.
Re: (Score:2)
Idiots (Score:2)
How many sites shouldn't require a password (Score:1)
I use a 4 tier approach:
1. Easy password for sites that do not store personal information/shouldn't require a password. Would have no problem giving it to anyone who asked.
2. Medium password. Sites I would feel comfortable sharing login details with friends and acquaintances. Wifi. Netflix.
3. Strong password. Sites I may need to share with wife and family. Amazon. Walmart.
4. Paranoid password. Sites that force me to store financial data. Email. Google. Banking
In related news... (Score:2)
Misleading subject (Score:2)
Re: (Score:1)
Too many signups (Score:2)