Not only does the credit bureau max out their password length, you have a small list of available non-alphanumeric characters you can use, and no spaces. Also you cannot used a plused email address, and it had an issue with my self hosted email alias, forcing me to use my gmail address.

Both Experian and transunion had no password length limitations, nor did they require my username be my email address.

Update: I have been unable to log into my account for the last 3 days now. Every time I try I get a page saying to call customer service. After a total of 2 hours on hold I finally found the issue, you cannot connect to Equifax using a VPN. In addition there is no option for 2FA (not even email or sms) and they will hang up on you if you push the issue of their security being lax. Their reasoning for lax security and no vpn usage is “well all of our other customers are okay with this”.

You are viewing a single thread.
View all comments
90 points

This implies they’re storing the plaintext password.

Ideally the password would be hashed with a salt and then stored. Then it’s a fixed length field and it shouldn’t matter how long the password is.

permalink
report
reply
32 points

Or a very very old database system, possibly DB2, where you can’t change the column limits or data types after the fact.

permalink
report
parent
reply
10 points

If they’re hashing, the column size should be irrelevant. Ideally the database should never see the plaintext password in the first place (though I could understand calculating the hash in the query itself). If they’re not hashing, they should really be rewriting their database anyway.

permalink
report
parent
reply
7 points
*

Salted passwords are not recommended anymore. Better to use a memory hard key derivation function designed for passwords, like Argon.

https://en.wikipedia.org/wiki/Argon2

permalink
report
parent
reply
17 points

Those are salted, they just do it for you.

permalink
report
parent
reply
1 point

Where does the salt get stored?

permalink
report
parent
reply
6 points
*

I’d rather see a paper explaining the flaws with salted passwords rather than “just use this instead”.

My initial reaction is that this overcomplicates things for the majority of use-cases, and has way more to configure correctly compared to something basic like a salted sha256/sha512 hash that you can write in any language’s standard library.

If the database of everyone’s salted password hashes gets leaked, this still gives everyone plenty of time to change passwords before anything has a chance of cracking them. (Unless you’re about to drop some news on me about long time standard practices being fundamentally flawed)

permalink
report
parent
reply
1 point

Wut. Is the competition not enough data for you? This is how we got AES.

Can you name a single popular language where Argon2 isn’t implemented in a stamdard library?

permalink
report
parent
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 7.4K

    Monthly active users

  • 2.8K

    Posts

  • 75K

    Comments