{"id":1757,"date":"2008-08-11T09:14:28","date_gmt":"2008-08-11T13:14:28","guid":{"rendered":"http:\/\/pcin.net\/update\/?p=1757"},"modified":"2015-09-14T08:07:56","modified_gmt":"2015-09-14T12:07:56","slug":"goodbye-passwords-you-arent-a-good-defense","status":"publish","type":"post","link":"http:\/\/pcin.net\/update\/2008\/08\/11\/goodbye-passwords-you-arent-a-good-defense\/","title":{"rendered":"Goodbye, Passwords. You Aren\u2019t a Good Defense."},"content":{"rendered":"<div class=\"entry\">\n<p>From the <a href=\"http:\/\/pcin.net\/c\/?2182\">New York Times<\/a>:<\/p>\n<blockquote><p>The best password is a long, nonsensical string of letters and numbers and punctuation marks, a combination never put together before. Some admirable people actually do memorize random strings of characters for their passwords \u2014 and replace them with other random strings every couple of months.<\/p>\n<p>Then there\u2019s the rest of us, selecting the short, the familiar and the easiest to remember. And holding onto it forever.<\/p>\n<p>I once felt ashamed about failing to follow best practices for password selection \u2014 but no more. Computer security experts say that choosing hard-to-guess passwords ultimately brings little security protection. Passwords won\u2019t keep us safe from identity theft, no matter how clever we are in choosing them.<\/p><\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>From the New York Times: The best password is a long, nonsensical string of letters and numbers and punctuation marks, a combination never put together before. Some admirable people actually do memorize random strings of characters for their passwords \u2014 and replace them with other random strings every couple of months. Then there\u2019s the rest &#8230;<\/p>\n","protected":false},"author":1977,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2,27],"tags":[],"class_list":{"0":"post-1757","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-computer-news","7":"category-security-tips","8":"anons"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/posts\/1757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/users\/1977"}],"replies":[{"embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/comments?post=1757"}],"version-history":[{"count":0,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/posts\/1757\/revisions"}],"wp:attachment":[{"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/media?parent=1757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/categories?post=1757"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/pcin.net\/update\/wp-json\/wp\/v2\/tags?post=1757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}