[GTALUG] tr: Illegal byte sequence

Jamon Camisso jamon.camisso at utoronto.ca
Thu Sep 27 09:46:38 EDT 2018


On 27/09/18 09:35, James Knott via talk wrote:
> On 09/27/2018 09:29 AM, Jamon Camisso via talk wrote:
>> f.,,H%+IMpQ-yDG+W'5'+AmjU$CcF*ZK
>>
>> That said, if that's a password for a human, I pity the person who has
>> to type it.
> 
> What???  You mean you haven't memorized it?  ;-)
>> What are you using passwords like that for, as opposed to some kind of
>> key based auth?
> 
> I use that sort of password for WiFi.  However, I use the Perfect
> Passwords from www.grc.com.  They have 63 random character strings just
> for that purpose.
> 
> Here's an example:
> "57,%Y9N<Ure}tgrJO[7DS;NElk~/\"mxPyE1BB#,n!so%sl/j6[0JS*R_Db(Yx

Doesn't seem worth the hassle for short sequences.

GRC sequence:
echo '"57,%Y9N<Ure}tgrJO[7DS;NElk~/\"mxPyE1BB#,n!so%sl/j6[0JS*R_Db(Yx'
|ent |grep Entropy
Entropy = 5.468750 bits per byte.

pwgen sequence:
pwgen -s -y 63 1 |ent |grep Entropy
Entropy = 5.538910 bits per byte.

Negligible difference, and FWIW Ted Ts'o wrote pwgen.

Cheers, Jamon


More information about the talk mailing list