• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle




  • Ooo, I was trying to think of what to answer in this thread and you just reminded me of another Orson Scott Card book, Empire.

    Absolute trash. Prior to that I had read all of the Ender and Bean series and loved them. Didn’t know much about Card personally, but picked up this book because it was supposed to be tied in with a video game I was looking forward too.

    Reading this book is how I found out what a shitty person he really is. It was basically all him hitting you over the head with his shitty fascist ideology while jerking off to a bunch of military porn like a dollar store version of Tom Clancy. I never did play the game.





  • What you want is NIST 800-63b https://pages.nist.gov/800-63-3/sp800-63b.html#memsecret

    Specifically sections 5.1.1.1 and 5.1.1.2.

    Excerpt from 5.1.1.2 pertaining to complexity and rotation requirements:

    Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

    Appendix A of the document contains their reasoning for changing from the previous common wisdom.

    The tl;dr of their changes boil down to length is more important than any other factor when it comes to password security.

    Edit to add:

    In my personal opinion, organizations should be trying to move away from passwords as much as possible. If your IT team seems to think this system is so important that they need to rotate passwords every month, they should probably be transitioning to hardware security tokens, passkeys, or worst case, password with non-sms MFA.

    Now I know nothing about the actual circumstances and I know there are plenty of reasons why that may not be possible in this specific case, but I’d feel remiss if I didn’t mention it.


  • Any organization still doing this is a decade behind best practices. NIST published new recommendations years ago that specified getting rid of the practice of regular forced password resets specifically because they encourage bad practices that make passwords weaker.

    Of course it doesn’t help that there are some industry compliance standards that have refused to update their requirements, but I don’t know of any that would require monthly password changes.




  • I worked at a grocery store in 2003 in California for a short time. I joined just after a major strike had ended. As always, the company was pushing for lower wages and benefits, the union wanted higher. They came to an agreement with a two tiered system, tenured employees got to stick with a pay scale and benefits slightly better than what they’d had before.

    New employees got fucked.

    A couple months in I was promoted to cashier from bagger and got to see the two tiers. I was starting at $18 per hour, the original tier started at more than double that and went up pretty high.

    Not really related to your comment, but I’m a little drunk after a rough day and seeing those amounts just really fucking pisses me off. My numbers are not adjusted for inflation and wages have gone down for the job I did in the last 20 years. It’s fucking maddening.