I've gotta think these are circular reports
In today's age, I gotta think this report is poisoned by circular reporting. You dumped the data, which then gets re-dumped, re-posted, and then "re-hacked," "Re-Leaked," "Re-released." As most websites and IIS servers won't allow 123456 don't allow less than 8, and we see these lists now every year, it just seems less plausible.
Also, I use a level of sophistication driven by the type of system. My banking password is upper, lower, special char, and follows no system (keyboard, words, etc). However, my hotspot password is literally easy since if you're physcially within RF range of my house I can see you and I actively monitor my LAN IP list. I share pw with roommates so a sophisticated pw means countless, "Whats the PW again?" conversations I don't want.
Social media PW is between the two, and I don't use the same one. (e.g. unlike CENTCOM, you can't hack my Twitter and FB at the same time)
In today's age, I gotta think this report is poisoned by circular reporting. You dumped the data, which then gets re-dumped, re-posted, and then "re-hacked," "Re-Leaked," "Re-released." As most websites and IIS servers won't allow 123456 don't allow less than 8, and we see these lists now every year, it just seems less plausible.
Also, I use a level of sophistication driven by the type of system. My banking password is upper, lower, special char, and follows no system (keyboard, words, etc). However, my hotspot password is literally easy since if you're physcially within RF range of my house I can see you and I actively monitor my LAN IP list. I share pw with roommates so a sophisticated pw means countless, "Whats the PW again?" conversations I don't want.
Social media PW is between the two, and I don't use the same one. (e.g. unlike CENTCOM, you can't hack my Twitter and FB at the same time)