Editing Talk:2176: How Hacking Works

Jump to: navigation, search
Ambox notice.png Please sign your posts with ~~~~

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 11: Line 11:
 
Note that you can sort of get the best of both words if, instead of using just common password or just password written on paper, you use password combined from those two. Online hackers wouldn't be able to hack your other accounts because all accounts have different password, while family members wouldn't be able to hack anything because they wouldn't know the common prefix to those passwords written on paper. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 22:43, 15 July 2019 (UTC)
 
Note that you can sort of get the best of both words if, instead of using just common password or just password written on paper, you use password combined from those two. Online hackers wouldn't be able to hack your other accounts because all accounts have different password, while family members wouldn't be able to hack anything because they wouldn't know the common prefix to those passwords written on paper. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 22:43, 15 July 2019 (UTC)
 
:Nah... I just need to 1) obtain a list of leaked passwords, 2) break into your pad/cubicle to obtain your dead-tree-list of partial passwords, 3) successfully identify the fully expanded one in the former that is the superset of the appropriate partial in the latter, 4) thusly derive the likely transformation you used, 5) apply that to all the other partials to easily h4ck 4ll ov UR 07|-|3|2 |_°9!|\|5 !!!111!!11oneoneone ...6) Profit? [[Special:Contributions/162.158.34.172|162.158.34.172]] 00:09, 16 July 2019 (UTC)
 
:Nah... I just need to 1) obtain a list of leaked passwords, 2) break into your pad/cubicle to obtain your dead-tree-list of partial passwords, 3) successfully identify the fully expanded one in the former that is the superset of the appropriate partial in the latter, 4) thusly derive the likely transformation you used, 5) apply that to all the other partials to easily h4ck 4ll ov UR 07|-|3|2 |_°9!|\|5 !!!111!!11oneoneone ...6) Profit? [[Special:Contributions/162.158.34.172|162.158.34.172]] 00:09, 16 July 2019 (UTC)
::Or just drug you and beat you with a wrench until you give up the passwords [[Special:Contributions/172.68.255.14|172.68.255.14]] 13:59, 20 July 2019 (UTC)
 
  
 
I'm disappointed that the template at the top want authored by "The Sharpest Tool in the Shed."  [[User:Mootstrap|Mootstrap]] ([[User talk:Mootstrap|talk]]) 02:39, 16 July 2019 (UTC)
 
I'm disappointed that the template at the top want authored by "The Sharpest Tool in the Shed."  [[User:Mootstrap|Mootstrap]] ([[User talk:Mootstrap|talk]]) 02:39, 16 July 2019 (UTC)
  
 
Anyone has idea why Randall keeps ignoring existence of password managers? [[Special:Contributions/162.158.103.147|162.158.103.147]] 07:31, 16 July 2019 (UTC)
 
Anyone has idea why Randall keeps ignoring existence of password managers? [[Special:Contributions/162.158.103.147|162.158.103.147]] 07:31, 16 July 2019 (UTC)
:Because some people don’t use them? [[Special:Contributions/172.69.33.251|172.69.33.251]] 07:31, 27 July 2019 (UTC)
+
 
 
I have to say, I'm not aware of anyone who thinks hacking is as Randall describes. I would have thought that most people would mistakenly think hacking is about typing complex green code onto a screen until a message pops up saying "ACCESS GRANTED". [[User:Hawthorn|Hawthorn]] ([[User talk:Hawthorn|talk]]) 12:23, 16 July 2019 (UTC)
 
I have to say, I'm not aware of anyone who thinks hacking is as Randall describes. I would have thought that most people would mistakenly think hacking is about typing complex green code onto a screen until a message pops up saying "ACCESS GRANTED". [[User:Hawthorn|Hawthorn]] ([[User talk:Hawthorn|talk]]) 12:23, 16 July 2019 (UTC)
 
:Well, some people put a lot of emphasis of never to write a password down, to prevent insider attacks. This leads to people reusing passwords, which leads to the much bigger risk as displayed here. So this comic is in line with [[936: Password Strength]] to keep superstition out of password policies and the attached mindsets of users. (Especially the combination of using long complex passwords, as in 936, and to never write them down would lead people to reuse them a lot.). Randall here mocks, that insider threats are only a threat with insiders (family, friends, coworkers, etc. unless you work (or use your device) in a public place, while the much bigger threat for everyone is anonymous hackers going for quantity. --[[User:Lupo|Lupo]] ([[User talk:Lupo|talk]]) 13:43, 16 July 2019 (UTC)
 
:Well, some people put a lot of emphasis of never to write a password down, to prevent insider attacks. This leads to people reusing passwords, which leads to the much bigger risk as displayed here. So this comic is in line with [[936: Password Strength]] to keep superstition out of password policies and the attached mindsets of users. (Especially the combination of using long complex passwords, as in 936, and to never write them down would lead people to reuse them a lot.). Randall here mocks, that insider threats are only a threat with insiders (family, friends, coworkers, etc. unless you work (or use your device) in a public place, while the much bigger threat for everyone is anonymous hackers going for quantity. --[[User:Lupo|Lupo]] ([[User talk:Lupo|talk]]) 13:43, 16 July 2019 (UTC)
 
I have removed the claim that "Most crimes are committed by people known to their victims, [...]". This might be true for crimes committed in the real world, but I doubt that's true for "cybercrimes" (Urgh. That term!). Please do re-add it if you have a credible source for it! ;-)  [[Special:Contributions/172.68.50.36|172.68.50.36]] 16:15, 16 July 2019 (UTC)
 
 
 
 
There are Smash Mouth message boards? [[User:Youforgotthisthing|Youforgotthisthing]] ([[User talk:Youforgotthisthing|talk]]) 16:28, 16 July 2019 (UTC)
 
 
First panel: Where's the fourth Teenage Mutant Ninja Turtle??[[Special:Contributions/162.158.214.82|162.158.214.82]] 11:09, 17 July 2019 (UTC)
 
:He's picking up pizza for the crew! [[User:Ianrbibtitlht|Ianrbibtitlht]] ([[User talk:Ianrbibtitlht|talk]]) 12:25, 17 July 2019 (UTC)
 

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)