back to article REVEALED: TEN MEEELLION pinched passwords and usernames

Security consultant Mark Burnett has dumped 10 million username and passwords onto the world, in what he claims is an effort to improve research. The huge pile, collected from caches revealed after years of breaches, was scrubbed clean of corporate information and domain data before its release. Burnett said he went to " …

  1. Anonymous Coward
    Anonymous Coward

    Increase the noise ?

    Maybe there should be more dumps of bogus usernames and passwords. Slow the scammers down a little.

    1. This post has been deleted by its author

      1. Cuddles

        Re: Increase the noise ?

        Password safes certainly aren't a bad idea, but that article just reinforces the myth that a good password must be an un-rememberable string of gibberish. As xkcd explained, correct horse battery staple.

        1. Anonymous Coward
          Anonymous Coward

          Re: Increase the noise ?

          Correct horse battery staple is horribly vulnerable to a phased dictionary attack.

          Please keeping using it and being smug about using it.

          1. DanDanDan

            Re: Increase the noise ?

            For the ignorant, could you explain what a "phased dictionary attack" is? I tried googling but got squat

          2. Roland6 Silver badge

            Re: Increase the noise ?

            re: "Correct horse battery staple"

            I would be surprised if this specific password isn't in password cracking dictionary's, so yes if you were to use this specific password then you have been warned. However, if you understand the concepts this memorable shorthand convey's and apply these, it is highly unlikely that your passwords will be vulnerable to a phrased dictionary attack.

            But then as the sources of these leaked passwords attest to, the problem isn't so much due to users having weak passwords, but website owners not properly protecting the login and password details of their registered users...

            1. Cuddles

              Re: Increase the noise ?

              @Roland6 - I'm always surprised it never seems to show up in the lists of commonly used passwords. Obviously you'd have to be an idiot to actually use that specific phrase since it's so well known. It's rather sad how few people actually seem to understand what that xkcd actually explained though, and just shout "Words! Dictionary!" and think they've somehow made a valid counter-argument. If you use an unknown number of words of unknown length to form a password of unknown length, a dictionary attack is simply impossible; when you have to check all words from one character length upwards, you're just doing regular brute force guessing.

              It's similar to the silliness of insisting on using upper case, numbers and punctuation. Sure, increasing the number of possible characters increases the number of possible permutations, but so does making your password a few characters longer. A password that forces you to use at least one capital letter and number but restricts you to a maximum of 8 characters, as many websites do, is far less strong than one made entirely of lower case letters that is allowed to be 20 or 30 characters long or more. Yet the latter will almost always be classed as weak by sites that claim to check the strength of a password when you're choosing it.

              @Symon - yes, I didn't say not to use a password safe, I was simply criticising their repetition of the myth that random gibberish is the only good password. The problem of remembering large numbers of different passwords is a separate matter, and is always going to be a problem no matter how memorable each password might be individually. I may be able to remember the lyrics to at least 50 songs, but if I use an entire song as a password for 50 different sites there's no way I'd be able to remember which song goes with which site. Passwords safes are useful no matter how you generate your passwords.

        2. This post has been deleted by its author

          1. Anonymous Coward
            Anonymous Coward

            Re: Increase the noise ?

            @Cuddles - sorry, but the only secure password *is* an unrememberable random string of multi-character gibberish. Minimum of 18 characters, with the sort of cheap firepower available from Amazon etc. these days.

            The lifehacker article is more-or-less there except they use dropbox to store their password file which strikes me as definitely risky.

      2. Anonymous Coward
        Anonymous Coward

        Password safes ...

        what's the point, when it seems lot of people are happy to "log in with Facebook". Or Twitter. Or Google.

        One password - so many sites.

  2. DropBear

    After reading the article a second time, I'm still at a loss trying to figure out specifically how did he acquire that cache of passwords - "being freely available on the internet" is more than a bit vague. Exactly how does one go about collecting thousands of passwords a day...? Because I sure can't remember the last time I saw a forum post with "oh and by the way, my login is xxxxx and my password is yyyyy..."

    1. Dave 126 Silver badge

      >I'm still at a loss trying to figure out specifically how did he acquire that cache of passwords

      Second paragraph:

      The huge pile, collected from caches revealed after years of breaches, was scrubbed clean of corporate information and domain data before its release.

      Fourth paragraph:

      "These are old passwords that have already been released to the public; none of these passwords are new leaks," Burnett (@m8urnett) wrote in a post addressing some received criticism.

      It seems that he has merely collated usernames and passwords from past breaches that others have published on the internet.

      1. king of foo

        Pastebin etc

  3. James 139

    OMG quick!

    Someone ban dictionaries, the damned things are full of passwords!!

    1. Anonymous Coward
      Anonymous Coward

      Re: OMG quick!

      No, dictionaries contain the most secure passwords:

      http://xkcd.com/936/

      1. James 139

        Re: OMG quick!

        I pretty certain, at least last time i checked, that horse, staple and battery were all in the dictionary.

        1. Anonymous Coward
          Anonymous Coward

          Re: OMG quick!

          That was the point, nevermind

  4. jake Silver badge

    "the dump stepped on the edge of ethical practise"

    On the edge? That's WAY over the slippery slope, and sliding downhill with no recovery possible. Enjoy your crash & burn, Mark Burnett. You'll never work the security field again.

    (Hint: Never make life easier for skiddies. It'll bite you in the long run.)

    1. Androgynous Cupboard Silver badge

      Re: "the dump stepped on the edge of ethical practise"

      Garbage. I'm obliged to him and off to download it to see which, if any, of mine are there.

    2. anothercynic Silver badge

      Re: "the dump stepped on the edge of ethical practise"

      Uhhhhhh... no.

  5. People's Poet

    Ah the old "But I did it for the greater good!" argument! What a complete bell end! As for his tweet about every hack today not being his fault, I can guarantee there are a few that are!

    1. dogged

      No you can't.

      1. John B Stone
        Pirate

        He might be able to guarantee it, if he is a hacker and recognises anything in there.

  6. Graham Marsden
    Black Helicopters

    "ambiguous Computer Fraud and Abuse Act"

    Many a true word spoken by accident...!

  7. Tikimon
    Angel

    Good passwords CAN be easy!

    I train my users to create 12+ character passwords based on easy to recall sentences, often movie quotes. Use first one or two characters of each word, capital at the start, add punctuation at the end. The user does not have to remember the actual password, but types it in as they run through the sentence. It lets low-skilled users reliably use passwords like Tharthedryolofo! Find THAT in a dictionary!

    Tharthedryoulofo! comes from THese ARen't THe DRoids YOu're LOoking FOr

    or Drandikewe13 - DRunk ANd DIsorderly KEy WEst 13 (for 2013)

    Yes, good passwords CAN be easy to create and recall, IF you use a good system. This one's working a charm for our users, but I'm sure there are others. Anyone?

    1. Anonymous Coward
      Anonymous Coward

      Re: Good passwords CAN be easy!

      I've been doing the same combined with uniques by site/function. Really, really long for the secure containers.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like