I looked at the short list of sample passwords in the article and
noticed that it looks very much what might be produced by a random
password generator program. Since the list doesn't seem to have
any duplicates, and the number of entries exceeds the world
population, my guess(tm) is some enterprising teenager wrote a
program to produce random passwords until his disk drive became
full. This is likely for a bogus but salable rainbow table (used
in password cracking). This won't the first time someone has
tried to pass off a computer generated rainbow table as a password
compilation. Bigger is considered better, but too big, like this
one is very suspicious.
https://project-rainbowcrack.com
https://www.ionos.com/digitalguide/server/security/rainbow-tables/
If the list had included user login names and email addresses,
entering it into https://haveibeenpwned.com would likely
show that every person on the planet has had their password
leaked. The problem here is that once an email address is listed
as having an associated password leaked, it's permanent. You can
change the password, but the operators of
https://haveibeenpwned.com
(and other) such sites have no way to know that you changed your
password.
2FA (two factor authentication) is the current fashion in
security. There are various schemes, devices, and apps available
for the purpose. I'm currently using Google Authenticator,
Microsoft Authenticator, and Aegis Authenticator. All of them run
on my Android phone. There are iPhone versions. The way they
work is you first login to a web site with the usual name and
password. The web site then asks you to look at your
authenticator application for a generated random PIN number, which
changes every 60 seconds. You type the number into the web page,
and you're on. If you don't like using an app, the web site can
send you an SMS (text) message with a PIN number. In theory, I
could publish my user name and password to the world, and nobody
could use it unless they have a matching authenticator app.
Unfortunately, there have been ways to intercept PIN numbers sent
via SMS messaging, so I suggest using a good open source
authenticator app for a smartphone.
https://getaegis.app
While I'm ranting on about security, you might be interested in
the following web pages if you have an AT&T, pacbell.net,
sbcglobal.net, yahoo.com, etc account. AT&T manages all these
and recently tightened security by demanding that users mail
clients use OAUTH2 for authentication. Google has been using
OAUTH2 for quite some time. However, it seems that many mail
clients don't work well with either AT&T or Google servers.
I'll spare you my opinion on who screwed up this time. If you are
having password or authentication problems with Google, Yahoo, or
AT&T email, this should "solve" the problem:
https://www.att.com/support/article/email-support/KM1240308/
https://support.google.com/accounts/answer/185833
These custom password workarounds and "solutions" are great
users with a small number of computers and email programs that
need to access a single affected account. Unfortunately, I have a
fairly large number of working machines and devices that I use for
email. This workaround requires a unique application specific
password for each machine and each app. So, this scheme isn't
going to work for me.
Ok, time for lunch. I should probably stop now before the
inevitable endless security discussion ruins my digestion.
-- Jeff Liebermann je...@cruzio.com PO Box 272 http://www.LearnByDestroying.com Ben Lomond CA 95005-0272 Skype: JeffLiebermann AE6KS 831-336-2558