this post was submitted on 19 Mar 2025
36 points (100.0% liked)

Cybersecurity

6746 readers
104 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 18 hours ago

Lists of real passwords are very useful for helping attackers crack passwords. Lists can be hashed with various algorithms and then the hashes compared against exposed password hashes. If a hash matches then you know the password, without having to actually brute force the password in order to try and match the hash.

Unique, strong passwords are the most safe. Reused passwords are for sure weaker if you use the same login/email along with them, but even if you use the same password with unique usernames, it's still less secure than unique passwords.

I can use pishadoot everywhere on the internet (bad for other reasons, but as an example) and if I use unique passwords everywhere, my accounts aren't any less secure, they're just all easily tied together. If I use unique usernames everywhere but reuse the same password, in theory ALL of my logins are now more vulnerable to attack.