The third largest breach ever just happened in Finland. Passwords were stored in plaintext. At T-Mobile Austria, they explain that of course they store the password in plaintext, but they have so good security so it's nothing to worry about. At what point does this become criminally negligent?
(Score: 0) by Anonymous Coward on Sunday April 08 2018, @11:45PM (2 children)
What I would do then is just hash my password per site, and use that hash as the password. Still won't stop people from logging in once they have the plaintext password, but at least they can't use the password, or even brute force it as they won't have any clue how it was derived to begin with.
(Score: 0) by Anonymous Coward on Monday April 09 2018, @01:55PM (1 child)
What if your hash fails to meet complexity requirements because it just happens not to have any capital letters in it? Or as is quite likely, is longer than they will accept?
(Score: 0) by Anonymous Coward on Monday April 09 2018, @08:43PM
Haven't had that happen just yet, but good point nonetheless. The way I wrote my method is does give both lowercase and uppercase letters. I think what I'll end up doing is adding a constant to the end of each password including a symbol, a number, and two letters, one in uppercase and one in lowercase.