-
Notifications
You must be signed in to change notification settings - Fork 0
Home
AmberIsCoding edited this page Oct 5, 2024
·
5 revisions
Passwords are still a primary defense against unauthorized access, yet many people use weak passwords or reuse them across platforms, exposing themselves to cyberattacks.
- Predictable Passwords: Weak or reused passwords are easily cracked via brute-force or exposed databases.
- Weak Randomness Sources: Many generators rely on pseudo-random number generators (PRNGs) that can be predictable if compromised.
Learn more on the True Randomness vs. Pseudo-Randomness page. ➡️
- Lack of Transparency: Users often don’t know how their passwords are generated or if the process is secure.
- Combining Randomness: This project strengthens password security by merging local cryptographic randomness with external true randomness from sources like drand. This increases entropy, making passwords harder to predict.
See how this project combines randomness for enhanced security. ➡️
- Open-Source & Transparent: The project's code is fully open-source, giving users confidence in the security methods we use.
- Educational: This tool doesn’t just create passwords — it teaches the importance of randomness in security.
For a deep dive, visit the Introducing drand page. ➡️
- Higher Entropy: More entropy means stronger, less predictable passwords.
- Increased Security: Strong randomness prevents patterns that attackers can exploit.
- Cryptographic Strength: Secure systems depend on random numbers for encryption and authentication.
For more about randomness in cryptography, check out the True Randomness vs. Pseudo-Randomness page. ➡️