{"id":1727,"date":"2018-09-03T15:03:16","date_gmt":"2018-09-03T20:03:16","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/?p=1727"},"modified":"2018-09-03T15:03:16","modified_gmt":"2018-09-03T20:03:16","slug":"i-use-the-same-password-everywhere","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2018\/09\/03\/i-use-the-same-password-everywhere\/","title":{"rendered":"I use the same password everywhere"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"https:\/\/www.flickr.com\/photos\/christiaancolen\/20971786578\" src=\"https:\/\/c2.staticflickr.com\/6\/5735\/20971786578_c870e94ba8_z.jpg\" alt=\"\" width=\"640\" height=\"359\" \/><\/p>\n<p>I am surprised by the number of people who tell me they use the same password for nearly everything. Even if the password is a strong password this is still incredibly insecure and most people do not realize why.<\/p>\n<p>If I reuse a password on multiple sites and just one of those sites is compromised, my one password is known by a bad actor.\u00a0 If that password is used for an email account or online storage, all my data could be deleted.\u00a0 If I use the same password for anything that has money attached to it, Amazon, iTunes, bank account, etc., it could be a costly mistake.<\/p>\n<p>I have used the same password on most of my sites for many years, but that password is altered so that each site appears to have a unique password.\u00a0 Let me explain how it works by showing how my password at Yahoo compares with my password at Google.<\/p>\n<p>For this example, let us make my password<\/p>\n<p>Secret1<\/p>\n<p>If I mix my password with the site I am logging into in such a way that I can reproduce the process in the future, I can come up with a unique password for each site I login to. Here is a simple &#8220;hash&#8221; of the site and my password.\u00a0 Take the first letter of the site followed by the first letter of my password, and continue to alternate letters from site and password until a &#8220;hash&#8221; is created.<\/p>\n<p><a href=\"http:\/\/www.trustyetc.com\/trustyblog\/wp-content\/uploads\/2018\/08\/passwordhash.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1730 size-full\" src=\"http:\/\/www.trustyetc.com\/trustyblog\/wp-content\/uploads\/2018\/08\/passwordhash.gif\" alt=\"\" width=\"400\" height=\"150\" border=\"1\" \/><\/a><\/p>\n<p>For Yahoo my password would be<\/p>\n<p>YSaehcoroet1<\/p>\n<p>For Google my password would be<\/p>\n<p>GSoeocgrleet1<\/p>\n<p>This is called a hash.\u00a0 A hash is a combination of two pieces of data that always produces the same final string of characters.\u00a0 This example alternates letters from the site and letters of my password.<\/p>\n<p>My example hash is simple and someone who has access to my final password would be able to reverse engineer it to determine the master password component of my hash.\u00a0 Then they would be able to use this hash anywhere I use it.<\/p>\n<p>Fortunately, there are many cryptographically strong hash functions available.\u00a0 A strong cryptographic hash cannot be reverse engineered to come up with the original master password.<\/p>\n<p>Here is an example that can be embedded into a web site.<\/p>\n<p><a href=\"https:\/\/gist.github.com\/windows98SE\/cc024ffb4cf501358edc\">https:\/\/gist.github.com\/windows98SE\/cc024ffb4cf501358edc<\/a><\/p>\n<p>I have embedded this hash algorithm into this page.<\/p>\n<p><a href=\"https:\/\/www.trustyetc.com\/password\">https:\/\/www.trustyetc.com\/password<\/a><\/p>\n<p>When I use Yahoo for the Site URL and Secret1 for the Master Password, the resulting hashed password is<\/p>\n<p>6D97cDf17270<\/p>\n<p>Try it yourself.\u00a0 You will get the same hash as I did with this combination.\u00a0 Keep in mind, both the URL and the password are case sensitive.\u00a0 Now compare the hashed password for Yahoo and Google<\/p>\n<p>6D97cDf17270<br \/>\n62C36b6F50f1<\/p>\n<p>Other than the first digit being the same, there is no similarity in the two hashes.\u00a0 Look at this string of password hashes for Yahoo where Secret1,\u00a0Secret2,\u00a0Secret3, Secret4 and\u00a0Secret5 are used respectively.<\/p>\n<p>6D97cDf17270<br \/>\n692BeDc3Af30<br \/>\n65D98a7D9bF3<br \/>\n48F486d92533<br \/>\n70328C6c69Ba<\/p>\n<p>Even though only one letter is changed in my master password, each hash is completely unique.\u00a0 This is a property of a good cryptographic algorithm.<\/p>\n<p>So it is safe to use one password on all your sites, as long as you run that password through a good hash beforehand.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am surprised by the number of people who tell me they use the same password for nearly everything. Even if the password is a strong password this is still incredibly insecure and most people do not realize why. If &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2018\/09\/03\/i-use-the-same-password-everywhere\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,10],"tags":[379,381,378,380,382],"class_list":["post-1727","post","type-post","status-publish","format-standard","hentry","category-edtech","category-education","tag-crypto","tag-cryptographic","tag-hash","tag-password","tag-security"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/1727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=1727"}],"version-history":[{"count":9,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/1727\/revisions"}],"predecessor-version":[{"id":1737,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/1727\/revisions\/1737"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=1727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=1727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=1727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}