A brilliant - and also terrible - idea - for discussion only #128
Replies: 2 comments 4 replies
-
Like you wrote it yourself you can't just send a password to search engine xy. This is just a no go. The HaveIBeenPwned matcher is already kind of shady but in that implementation you hash the password and only send the first 5 chars of the hash to them. But if someone really wanna get insulted by privacy advocates the person could build a custom matcher for the search engines :D. |
Beta Was this translation helpful? Give feedback.
-
Along a similar vein of terrible ideas, I am going to document this here. You could also have a matcher that tries to login to a bunch of services with the credentials of the user and fails them for password reuse. |
Beta Was this translation helpful? Give feedback.
-
Why it's brilliant
Search the first
n
characters of the password on a search engine.See how many results there are.
That can be like as one of the password scores. (the more results, lower the score)
Why it's terrible
The password will no longer be a secret if you send it to a search engine.
This is probably a showstopper for the idea.
You can limit the damage by only sending half of the password, or the first n words/tokens or whatever.
Inspired by the discussion in #63
The reason I came up with the idea. Is if someone uses a password like
maryhadalittlelambwhosfleecewaswhiteassnow
or whatever, it would likely return a billion search results, even though zxcvbn as is would probably think it's an amazing password.
Beta Was this translation helpful? Give feedback.
All reactions