this post was submitted on 29 Mar 2025
808 points (98.8% liked)

Technology

68245 readers
4793 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 16 points 5 days ago (3 children)

I use that command partially because Microsoft accounts don't allow passwords as long as the password I like to use for my PC

[–] [email protected] 19 points 5 days ago (2 children)

are you a horse battery staple wizard

[–] [email protected] 5 points 5 days ago (1 children)

Basically. It's essentially a full-on sentence and last time I looked, Microsoft allowed about half the character length.

[–] [email protected] 3 points 5 days ago

Well, at least they aren't pretending to accept longer passwords but actually truncating it, like they used to in hotmail and live.

They were silently truncating the passwords to something like the first 16 characters, the rest was ignored.

[–] [email protected] 11 points 5 days ago (1 children)

Which suggests to me that MS stores plaintext passwords. Because a hash function doesn't care about the length of what it's hashing, the output will always be the same length, so they could verify a 300 character password with the same storage space as a 3 character password.

[–] [email protected] 1 points 5 days ago (1 children)

Not how it works. You don't attempt to guess the hashed password, you guess a password which then is hashed

[–] [email protected] 2 points 5 days ago

What's stored is hash(password). Then the password check is stored == hash(entered).

Hash(x) will be the same length, regardless of what x is. What that length is depends on which hash function it is. So the database can set the length of its storage for each user's password to the length of the hash and the hash function will take any size password.

[–] [email protected] 3 points 5 days ago* (last edited 4 days ago) (1 children)

Genuine question:

What's the point of a long password on Windows? I understand that sometimes you don't want people accessing your stuff, but all it takes to bypass that and someone access your files is booting off of a USB stick. Or do you perhaps use full disk encryption?

[–] [email protected] 8 points 5 days ago

Most people are more worried about remote attackers than someone physically putting hands on their PC. But, yes, you should pretty much without exception be using full disk encryption.

It's very assholish of Microsoft to lock bitlocker behind the Pro license.