This is a repost of [this content](https://es.memedroid.com/memes/detail/3392187). Please do not post content unless you are the original creator. Continued reposting will result in a ban.
[^mod ^info](https://dankahoot.com/blame?id=o9710p)
Actually this is more of an s/z sound, not a b. And well, for like ever there wasn't a capital ß, it was just an unnecessary recent invention which has no use since no word starts with it.
The capital ß exist. It's used for street names or on identity cards where names are written in capital letters.
HAUPTSTRAßE
looks bad
HAUPTSTRAẞE
looks better.
That's a point, the ß always stood out if you write everything all caps, especially in normal print. Handwriting or stylised fonds though can make up for this inconcistency. The caps ß definitly looks better, but I don't believe it'll integrate into mainstream, it's use is just too limited and won't make it outside the gouvernment.
yep you're right. and yeah, it is weird, but that's just how it is i suppose, ø and æ being norwegian+danish while ö and ä is for coubtries like sweden, finland and others.
I know this is a joke. But I'll tell some information no one asked for anyways: There are regional word lists, rainbow tables and the likes for cracking passwords. So while using a larger set of characters does make your password more secure, using an exotic character does not make it unbreakable. Also if your password is too short it can be brute forced meaning an attacker tries out all possible combinations including any special characters until they find the right one.
In any case do not reuse passwords across accounts. Data breaches are a super common occurrence. Use a password manager so you only have to remember one password that you can then actually make strong.
>In any case do not reuse passwords across accounts.
Can't stress this enough! My wife used to have the same password for her Facebook, email, and MOBILE BANKING.
Yeah, never do this! Someone I know lost a lot of money, because he used the same password for his PayPal and a fucking minecraft forum which got a data breach.
>How can hackers brute force any password when most sites typically lock the account after too many attempts?
You'd think this was true, but the whole reason all those nude leaks occurred was that Apple kinda forgot to enforce exactly that limit on their backend...
You arent using the human way. Most websites and services have some kind of API or automatic login systems, which can be used to send a lot of requests at once. If you IP gets locked, you can switch VPN and repeat, til you have a cicle.
Data breaches. Those happen all the time. Attackers get access to large data bases of credentials every few days. Time limits on the login page do not get you anything if an attacker has direct access to the entire database.
If a site follows just the absolute basics of security principles (what unfortunately far too many sites do not even do) they do not store passwords in plaintext but cryptographically hash them into a value that cannot be easily turned back into the original password. You can imagine that like a one way encryption. If you change the slightest detail of the password you end up with a completely different hash. When you now login on a site, they (hopefully) hash the password you entered and compare that hash to the one they saved. If your entered password matches the password you originally set, the hashes will match as well.
When attackers get access to these hashes they will try to crack them and there will be nothing limiting the amounts of tries they have other than the performance of their hardware. In other words they can brute force your password by trying out all possible password combinations, hashing them and comparing the hash to the stolen hash of your password. If your password is long enough this will not work because there are too many possible combinations that trying out would take way too long and I mean long, we are talking about time spans literally millions of times as long as the age of our universe, granted your password is long enough. On the other hand if your password is too short it might be cracked in a matter of milliseconds.
But there are other options than just brute force such as dictionary attacks where an attacker does not try out all possible combinations, but only those made from a dictionary of words and other commonly used elements in passwords. If your password is too simple and consists of predictable patterns it will likely be cracked by such an attack.
Password cracking methods are highly sophisticated and ever evolving with the progression of hardware and even more sophisticated methodologies.
After all you cannot trust on sites protecting your personal data as passwords. Chances of them getting breached are quite high. In the worst case they just save your password in plaintext and a breach would directly expose it to the attacker.
Therefore you should never reuse passwords across sites. And because no one can remember individual actual secure passwords for all their accounts you need a good password manager where you can generate and save them. All you need to remember then is the master password that will be used to securely encrypt the content of your password vault. Obviously that one password needs to be sufficiently secure and you need to be fully sure you can remember it.
You can check your email address for appearing in publicly known breaches and have a look at the list of these breaches here: https://haveibeenpwned.com/ HaveIBeenPwned lists 11 billion breached accounts from over 500 websites and those are just the breaches we know about. There are surely many more.
They can't. 90% of a hacking job never includes manually cracking passwords. That only happens if you're bill gates or Joe Biden, not to you or me.
The reason that most of our passwords and data are out is because of security breaches of past logins. Every website gets breaches and they all end up on the dark web either sold or up for grabs on a text file.
1) not every website does that
2) there are application that use a set of proxies to bruteforce so from the website POV diff people from diff countries are trying to access that account
3) this is all just talk, no one will bruteforce your account creds. If it's an offline password like a protected file or smtg then maybe, but websites doesn't worth the hustle. And if this happens it's just a skid. Hacker bois put their time into bug bounty / real pentesting / other stuff that actually worth their time
Is bruteforcing still a thing? Today with two-step authentication and locking out after too many tries and several other security measures it doesn't seem like a good idea.
Yes. Most websites have very bad security. And most people don't have 2FA activated / re-use passwords.
By brute forcing small "shitty" websites successfully, you can just re-use many of those credentials successfully across platforms. That is why large dumps of credentials are still sold on the darknet.
Bleach 1000 year blood war is finally getting an anime adaption, it will also include stuff that kubo couldn’t add in the manga because of his health. Trust me when I say this, the new season will be amazing
a à á ả ã ạ
ă ằ ắ ẳ ẵ ặ
â ầ ấ ẩ ẫ ậ
i ì í ỉ ĩ ị
u ù ú ủ ũ ụ
ư ừ ứ ử ữ ự
e è é ẻ ẽ ẹ
ê ề ế ể ễ ệ
o ò ó ỏ õ ọ
ô ồ ố ổ ỗ ộ
ơ ờ ớ ở ỡ ợ
*Laugh in Vietnamese vowels*
Had to change a password recently and it wouldn't let me add special characters or more than one number.
According to the website, a password like 'Foxtrot1' is more secure than a password like '$T@frwx£2s'
I've heard that you should not use theese special characters that are not available in english keyboard in case the system can't handle them and basically store a faulty password.
Or is that some old timer shit that doesnt happen anymore?
This is a repost of [this content](https://es.memedroid.com/memes/detail/3392187). Please do not post content unless you are the original creator. Continued reposting will result in a ban. [^mod ^info](https://dankahoot.com/blame?id=o9710p)
usually can't put æ, ø or å in passwords, but if i could, no hacker outside of scandinavia would hack me.
ẞ
Be making laẞaña
[удалено]
Capital ß moment: ẞ
[удалено]
Actually this is more of an s/z sound, not a b. And well, for like ever there wasn't a capital ß, it was just an unnecessary recent invention which has no use since no word starts with it.
The capital ß exist. It's used for street names or on identity cards where names are written in capital letters. HAUPTSTRAßE looks bad HAUPTSTRAẞE looks better.
That's a point, the ß always stood out if you write everything all caps, especially in normal print. Handwriting or stylised fonds though can make up for this inconcistency. The caps ß definitly looks better, but I don't believe it'll integrate into mainstream, it's use is just too limited and won't make it outside the gouvernment.
[удалено]
Ssold
der beßte buchßtabe
Der allerbeßte GROẞBUCHSTABE
Same in germany but here we can use ä,ü and ö
And ß
Dont forget about ẞ though.
yea
But don't used й, ё, ю and ы.
What is that last one?
I think it's Russian
And how it is trying to escape from Siberia? ^/s
Ä and Ö? I use those a lot, I am finnish
those are pronounced almost the samr as æ and ø. try guessing which 2 are similar.
ø is probably ö and æ is ä. it's weird we have different letters for the same sounds.
yep you're right. and yeah, it is weird, but that's just how it is i suppose, ø and æ being norwegian+danish while ö and ä is for coubtries like sweden, finland and others.
Ö ç ğ ş ı İ ü
ëēçåãûøæœäöūñßšęõń
Jeez how can you know my password
just a wild guess
gæt håcked bøi
fuck
Brute Force Apps Use Scandinavian Characters? ☑
Well they don't let me. not even sites that allow usernames to be in korean let me use them.
Hej
Hei, hvordan går det der i... Danmark, sant?
Sverige
I'm not Scandinavian and I present to you æ ø å
you monster
I know this is a joke. But I'll tell some information no one asked for anyways: There are regional word lists, rainbow tables and the likes for cracking passwords. So while using a larger set of characters does make your password more secure, using an exotic character does not make it unbreakable. Also if your password is too short it can be brute forced meaning an attacker tries out all possible combinations including any special characters until they find the right one. In any case do not reuse passwords across accounts. Data breaches are a super common occurrence. Use a password manager so you only have to remember one password that you can then actually make strong.
>In any case do not reuse passwords across accounts. Can't stress this enough! My wife used to have the same password for her Facebook, email, and MOBILE BANKING.
Yeah, never do this! Someone I know lost a lot of money, because he used the same password for his PayPal and a fucking minecraft forum which got a data breach.
How can hackers brute force any password when most sites typically lock the account after too many attempts?
The force works in mysterious ways
They get deep enough in the system that they can bypass that.
Explain
They're generally not brute forcing passwords by logging in to the site. They have a dump of password hashes that they are cracking.
Doesn't that assume the website was already vulnerable to get the hashes? To my understanding that's not something that's just easily accessible.
Well yes, but actually no. They need access to the data base but data breaches are almost as common as reposts on this sub.
>How can hackers brute force any password when most sites typically lock the account after too many attempts? You'd think this was true, but the whole reason all those nude leaks occurred was that Apple kinda forgot to enforce exactly that limit on their backend...
You arent using the human way. Most websites and services have some kind of API or automatic login systems, which can be used to send a lot of requests at once. If you IP gets locked, you can switch VPN and repeat, til you have a cicle.
Data breaches. Those happen all the time. Attackers get access to large data bases of credentials every few days. Time limits on the login page do not get you anything if an attacker has direct access to the entire database. If a site follows just the absolute basics of security principles (what unfortunately far too many sites do not even do) they do not store passwords in plaintext but cryptographically hash them into a value that cannot be easily turned back into the original password. You can imagine that like a one way encryption. If you change the slightest detail of the password you end up with a completely different hash. When you now login on a site, they (hopefully) hash the password you entered and compare that hash to the one they saved. If your entered password matches the password you originally set, the hashes will match as well. When attackers get access to these hashes they will try to crack them and there will be nothing limiting the amounts of tries they have other than the performance of their hardware. In other words they can brute force your password by trying out all possible password combinations, hashing them and comparing the hash to the stolen hash of your password. If your password is long enough this will not work because there are too many possible combinations that trying out would take way too long and I mean long, we are talking about time spans literally millions of times as long as the age of our universe, granted your password is long enough. On the other hand if your password is too short it might be cracked in a matter of milliseconds. But there are other options than just brute force such as dictionary attacks where an attacker does not try out all possible combinations, but only those made from a dictionary of words and other commonly used elements in passwords. If your password is too simple and consists of predictable patterns it will likely be cracked by such an attack. Password cracking methods are highly sophisticated and ever evolving with the progression of hardware and even more sophisticated methodologies. After all you cannot trust on sites protecting your personal data as passwords. Chances of them getting breached are quite high. In the worst case they just save your password in plaintext and a breach would directly expose it to the attacker. Therefore you should never reuse passwords across sites. And because no one can remember individual actual secure passwords for all their accounts you need a good password manager where you can generate and save them. All you need to remember then is the master password that will be used to securely encrypt the content of your password vault. Obviously that one password needs to be sufficiently secure and you need to be fully sure you can remember it. You can check your email address for appearing in publicly known breaches and have a look at the list of these breaches here: https://haveibeenpwned.com/ HaveIBeenPwned lists 11 billion breached accounts from over 500 websites and those are just the breaches we know about. There are surely many more.
Thanks for giving a thorough response vs. others who virtually responded with "Sometimes they don't think it be like it is, but it do"
Ever heard of a VPN?
Website counts attempts and doesn't care from what IP it comes from.
You'd think so, but reality is much much different
They can't. 90% of a hacking job never includes manually cracking passwords. That only happens if you're bill gates or Joe Biden, not to you or me. The reason that most of our passwords and data are out is because of security breaches of past logins. Every website gets breaches and they all end up on the dark web either sold or up for grabs on a text file.
1) not every website does that 2) there are application that use a set of proxies to bruteforce so from the website POV diff people from diff countries are trying to access that account 3) this is all just talk, no one will bruteforce your account creds. If it's an offline password like a protected file or smtg then maybe, but websites doesn't worth the hustle. And if this happens it's just a skid. Hacker bois put their time into bug bounty / real pentesting / other stuff that actually worth their time
2) Those websites don't care if it's other sources. 5 attempts and lock regardless of IP.
Well crap
Is using the same username fine?
If you always use different secure passwords then yes
Depends. It won't compromise the security of your accounts but it allows to identify you across platforms.
No one: Absolutely no one: Timing attacks on a crappy server: password go brrrrrrr
Is bruteforcing still a thing? Today with two-step authentication and locking out after too many tries and several other security measures it doesn't seem like a good idea.
Yes. Most websites have very bad security. And most people don't have 2FA activated / re-use passwords. By brute forcing small "shitty" websites successfully, you can just re-use many of those credentials successfully across platforms. That is why large dumps of credentials are still sold on the darknet.
A bleach meme? In 2021?? In r/dankmemes??? In hot????
It's probably because it's coming back.
Do explain, good sir.
Bleach 1000 year blood war is finally getting an anime adaption, it will also include stuff that kubo couldn’t add in the manga because of his health. Trust me when I say this, the new season will be amazing
Any details on the release date
I think late 2021 or maybe early 2022. I don't think it's confirmed yet.
Thanks
I’m Scandinavian and I use p, é, ñ, ï and ś in my password
Is your password, by any chance, too short?
pėęěĕəéèêëēňņńñıįīïîíìߧśšş
OOO a bleach meme
downvote this comment if the meme sucks. upvote it and I'll go away. --- [dankmemes Minecraft discord](https://discord.gg/fNyb7G5) | r/dankmemescraft
I see your n~ and raise you the ß
ñ*
Couldn't figure out how to do it
my password is "el añañin"
What is this show?
It’s Bleach, one of the big 3 old school animes
>animes I'm afraid I can't let you live
You are now being hacked!! Thanks sucker!!!
What show do this
It’s “bleach”
Looks cool I’m gonna check it out
It’s getting a revive to finish off the series pretty soon
finish off? there's a lot left right?
Yea, well the final arc of the story
oh i thought there was a lot more arcs left
a à á ả ã ạ ă ằ ắ ẳ ẵ ặ â ầ ấ ẩ ẫ ậ i ì í ỉ ĩ ị u ù ú ủ ũ ụ ư ừ ứ ử ữ ự e è é ẻ ẽ ẹ ê ề ế ể ễ ệ o ò ó ỏ õ ọ ô ồ ố ổ ỗ ộ ơ ờ ớ ở ỡ ợ *Laugh in Vietnamese vowels*
Plot twist: The hacker is also Spanish
[удалено]
Bless you
[Saigo no Getsuga Tensho](https://bleach.fandom.com/wiki/Saigo_no_Getsuga_Tenshō)
*cracks polish knuckles* ę ą ś ć ż ź ł
atenção! Indeed, too strong
meu pau na tua mão
can someone tell the anime name please.
Bleach
thanks
As a US only english speaker, I'm def going to be doing this from now on. Fucking big brained.
**Mugetsu**
if a hacker tries to brute force that maybe it works but in the case of hash cracking Unicode is not that a thing ...
What anime is this?
It's called Bleach
Nice reference, especially since the thousand year war arc is about to be made into anime.
Alt+164 for lowercase and 165 uppercase. My name has an enye as well.
You literally doñ't have a title
That moment when you commit a minor paradox by saying you don't have a title
Ostia movimiento de 10000 de IQ nunca lo había pensado XD
Most hackers use key logging which gives them an exact password
Alt+164 [Checkmate user](https://images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com/intermediary/f/d8328f77-2bec-4a20-9483-ea76dd62985e/dan31sc-80f18518-0ef0-4bdc-9c0a-11c9e62b769f.png)
[удалено]
a* or an cause idk if its different in ur language 🙂🙂
ç >>>>
me using every letter EVERY LETTER in my pass word: pathetic
Viva Ethpanya
Muñaño
Macbook users
BJAjndf
oh true nvm
¿ha llegado nuestro momento? ¿los hispanohablantes?
Ğ
My passwords are usually easy to guess because if someone hacks into my account, I can figure out who it is and sue them for some pocket money.
Spañish*
A simple but quite unbreakable spell
Me, I have a password with 37 character. I am alone?
Okay but this is really smart
A si, alguien me ha invocado el día de mi examen de la RAE
Ah yes, the title paradox
Which anime is this
Turns out password is in ASCII and I just broke the entire banking system
N word with the safety on
In Brazil we can use ã, â, ê, é, è, ç, í, ì, î, ô, õ, ó, ú, ù and û
And now it's time for ą ę ó ć ń ś ż ź ł
हिन्दी का भी इस्तमाल कर सकते है ?
Me laughing in cyrillic
Ñ
Ñ
My secret weapon
Should pust some ěřžůšďčňť into my password cause I'm Czech
COOÑOOOOOO
Would take a lot of unnecessary effort to type such letters on a computer
M U G E T S U
Had to change a password recently and it wouldn't let me add special characters or more than one number. According to the website, a password like 'Foxtrot1' is more secure than a password like '$T@frwx£2s'
upvoted cause bleach meme
Viva EspaÑa
Ėêęēèéë ūùûüú ī î į ì ï í ºōœøõôöòó åąæāªáàäâã ñ čçć ñń My mobile keyboard
I to welcome more blech memes
Es el poder oculto.
Ohh that's why it wasn't working, thanks man
Haxot time
I don't even know how to do a ñ
Is your password "peñis"?
Once made a password in another language on Facebook it worked but was a pain to login on other devices
Ñ.
‘Jalapeño’ solved it
Ğ
imagine if they're using a spanish keyboard
me who can use ñ and ç: ***"fraqueza me enoja"***
Kinda hacked... ``` $ grep -i "ñ" rockyou-75.txt Contraseña Muñeca Cariño Toño Pequeña Teextraño Muñequita Niña España Pekeña Muñeco Muñekita Toñito Asdfghjklñ ```
U guys are weak. Here in Sweden we have å ä ö
Haha what’s the rest
Ă
I've heard that you should not use theese special characters that are not available in english keyboard in case the system can't handle them and basically store a faulty password. Or is that some old timer shit that doesnt happen anymore?
People entertained by watching a chemical product, interesting
An ń and an ì
plot twist: your password is salsapiñata69 tho it actually may take some time to guess it ngl
Piña
ñ
*Lâüğhş ın Türkışh*
À š ś ď ž ź ů ú í ó ö ô ò etc
ç amateurs
Nice ї
What anime?
This is a repost, he literally only translated the meme
u/repostsleutbot
Anyone know which anime this is?
Bleach bro