Google et al. have 2FA, list of devices, locations. Like you said, other serverside features, which I like a lot, more than a block list.
-
-
Replying to @spazef0rze @thorsheim and
It's very rare you would choose a secure AND leaked-from-someone-else pwd. Most blocklist hits will be either nonsecure or personal reuse.
1 reply 0 retweets 2 likes -
Replying to @marcelsulek @thorsheim and
The question is: is a block list the right way how to teach users about secure passwords/accounts? Maybe but you block 3 pws & they go away.
2 replies 0 retweets 0 likes -
Replying to @spazef0rze @thorsheim and
It's another tool in the chain. First something like zxcvbn to filter too simple pwds. Then a blocklist to prevent reuse.
1 reply 0 retweets 0 likes -
Replying to @marcelsulek @thorsheim and
With 300M block list you'll probably block anything not generated in a pw manager. I see why Top1(0)k might be a better option. It depends.
1 reply 0 retweets 0 likes -
Replying to @spazef0rze @marcelsulek and
You're grossly overestimating the coverage of the 300M set. very_secure_password isn't in it. Try some passwords for yourself and see.
2 replies 0 retweets 1 like -
Replying to @marcan42 @spazef0rze and
Random non obvious words from the dictionary aren't either. Seriously, it's not that bad. I'm tempted to add /use/share/dict/words to it.
1 reply 0 retweets 1 like -
Replying to @marcan42 @marcelsulek and
Great :-) Checked some passwords cracked w/ http://crackstation.net dictionary: exoddus Tbvfs1 9plams P1ll3d Neznašov Just the 1st is there.
3 replies 0 retweets 0 likes -
Replying to @spazef0rze @marcan42
These pws are from a 2012 local nano leak with ~300 hashes. Might run some more through the 300M set to see the coverage. Thanks!
1 reply 0 retweets 0 likes -
Replying to @spazef0rze
You can grab my Bloom filter and quickly test like this: https://gist.github.com/marcan/23e1ec416bf884dcd7f0e635ce5f2724 …pic.twitter.com/WsKLTJCcra
1 reply 0 retweets 0 likes
For performance, throw the Bloom filter on a ramdisk/tmpfs or just 'cat foo.bloom > /dev/null' before to precache it in one go.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.