[GTALUG] tr: Illegal byte sequence
Jamon Camisso
jamon.camisso at utoronto.ca
Thu Sep 27 09:46:38 EDT 2018
On 27/09/18 09:35, James Knott via talk wrote:
> On 09/27/2018 09:29 AM, Jamon Camisso via talk wrote:
>> f.,,H%+IMpQ-yDG+W'5'+AmjU$CcF*ZK
>>
>> That said, if that's a password for a human, I pity the person who has
>> to type it.
>
> What??? You mean you haven't memorized it? ;-)
>> What are you using passwords like that for, as opposed to some kind of
>> key based auth?
>
> I use that sort of password for WiFi. However, I use the Perfect
> Passwords from www.grc.com. They have 63 random character strings just
> for that purpose.
>
> Here's an example:
> "57,%Y9N<Ure}tgrJO[7DS;NElk~/\"mxPyE1BB#,n!so%sl/j6[0JS*R_Db(Yx
Doesn't seem worth the hassle for short sequences.
GRC sequence:
echo '"57,%Y9N<Ure}tgrJO[7DS;NElk~/\"mxPyE1BB#,n!so%sl/j6[0JS*R_Db(Yx'
|ent |grep Entropy
Entropy = 5.468750 bits per byte.
pwgen sequence:
pwgen -s -y 63 1 |ent |grep Entropy
Entropy = 5.538910 bits per byte.
Negligible difference, and FWIW Ted Ts'o wrote pwgen.
Cheers, Jamon
More information about the talk
mailing list