原文
| ||||||||||
| ||||||||||
![]() |
原始链接: https://news.ycombinator.com/item?id=43398692
Hacker News 的讨论围绕着在线账户安全以及不同身份验证方法的有效性展开。最初的评论指出密码重用是一个主要漏洞,强调即使是强密码,如果从其他服务泄露,也会变得毫无用处。它提倡使用独特的密码、密码管理器或双因素身份验证 (2FA)作为解决方案。随后的评论批评了依赖电话号码或专有应用程序进行 2FA 的做法,更倾向于使用 TOTP 以获得更大的用户控制权和隐私。讨论随后转向密钥,承认它们有可能消除与密码相关的各种问题,但也对单点故障、供应商锁定以及对不太懂技术的用户的可访问性表示担忧。最后,一位用户指出,即使是记住的复杂密码,如果没有启用 2FA,仍然容易受到键盘记录器的攻击。
| ||||||||||
| ||||||||||
![]() |
No one can crack your super-strong multilingual password. But if a service accidentally leaks it, then it doesn't matter.
Credential Stuffing is how 23andMe were hacked. People reused password, they were leaked from another service, attackers tried them on a variety of sites until they hit the jackpot.
Unique passwords prevent that attack. Can't remember a thousand different passwords? Use a manager.
Don't want to use a manager? Switch on 2FA. Weak passwords and password reuse ceases to be a problem.
Yes, as the article points out, it slightly reduces ease of login. But that seems like a sensible trade off.
reply