I’m aware of what constitutes a decent password, but typing in 15-30 random characters each time I lock my computer screen is starting to get a bit taxing.

How secure does my user password really need to be and what are the threats to it? Does the same apply to a root-enabled user as a “regular” user when it comes to password security?

For context, my threat model doesn’t need to account for real people breaking in and accessing my computer, the damage would be very contained.

Bonus question - what are the risks of having a weak password on a root user on a spare laptop on the same network as my main device that is used exclusively for web browsing? Thanks.

    • otp@sh.itjust.works
      link
      fedilink
      arrow-up
      17
      ·
      edit-2
      3 months ago

      I was wondering why 1 year was in the red category, but then I realized that that time could decrease quite a bit over time with technological advances

      EDIT: typo

      • golli@lemm.ee
        link
        fedilink
        arrow-up
        13
        arrow-down
        1
        ·
        3 months ago

        The chart also doesn’t specify what hardware the calculation is based on. If it’s “1 year to crack for your average desktop PC”, then a server farm will do so in minutes.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 months ago

      The hash doesn’t matter from a device perspective. The OS enforces a retry delay and a person would need to use a keyboard.

    • Caveman@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      3 months ago

      This is for random characters but “interestingpassword” will get cracked by a dictionary attack almost instantly.

    • delirious_owl
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      Lots of hand waving in this, but its good for relative comparison