{"id":445,"date":"2018-05-03T13:21:58","date_gmt":"2018-05-03T13:21:58","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/recycling-is-a-must-but-why-would-you-reuse-your-password\/"},"modified":"2019-05-29T12:48:24","modified_gmt":"2019-05-29T12:48:24","slug":"recycling-is-a-must-but-why-would-you-reuse-your-password","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/","title":{"rendered":"Recycling is a must, but why would you reuse your password?"},"content":{"rendered":"<p>World Password Day, celebrated on the first Thursday of every May, is a timely reminder of the fact that our passwords are the key to a wealth of personal information about us.<\/p>\n<p>It would be nice to imagine that if the various contenders for \u201cinventor of the password\u201d had known how much of a hassle its computer variety would end up posing centuries later, they would never have bothered. Or maybe that inventor \u2013 perhaps a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shibboleth\" target=\"_blank\" rel=\"noopener noreferrer\">Gileadite<\/a> or Roman soldier \u2013 just didn\u2019t care about the tradeoff between security and convenience that would plague us in the internet era. Either way, the legacy of the <a href=\"https:\/\/www.welivesecurity.com\/2017\/05\/04\/short-history-computer-password\/\" target=\"_blank\" rel=\"noopener noreferrer\">military watchword<\/a> is here to stay.<\/p>\n<p>Quipping aside, the routine works like this: you sign up with your username and password that only you know, and you\u2019re golden. To log in again, you just need to recall and input your login credentials. Of course you knew this would happen, so you took some \u201cprecautions\u201d: you set up the account with an easy-to-remember password.<\/p>\n<p>And therein lies the problem. \u201cEasy-to-remember\u201d most often equates to short and simple, as well as easy to guess. That\u2019s especially true for password-cracking software doing the bidding of an operator intent on brute-forcing his way into your account. Such software can open the trove of treasures just as magically as the phrase \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Open_Sesame_(phrase)\" target=\"_blank\" rel=\"noopener noreferrer\">Open Sesame!<\/a>\u201d does with the mouth of a cave in a well-known folk story.<\/p>\n<p>On the flip side, a password that is long, complex and random is harder to crack, but also harder to remember. And therein lies the problem (yes, again!). Recalling many impossible-to-guess passwords and being able to remember to which particular online service each belongs is just too much of a tall order, unless you have the memory of an elephant.<\/p>\n<p>Indeed, passphrases \u2013 say it with me, \u201c<a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/05\/forget-about-passwords-you-need-a-passphrase\/\" target=\"_blank\" rel=\"noopener noreferrer\">I LOVE to Read WeLiveSecurity!<\/a>\u201d \u2013 may help both in terms of security and convenience (the latter being simply a proxy for memorability). However, is it reasonable to expect every user to remember a distinct passphrase or password for each and every online account?<\/p>\n<h2><strong>Something\u2019s got to give<\/strong><\/h2>\n<p>What many people do \u2013 at least those who are not elephants \u2013 is skimp on their security, use an <a href=\"https:\/\/www.welivesecurity.com\/2017\/12\/27\/worst-passwords-year-revealed\/\" target=\"_blank\" rel=\"noopener noreferrer\">atrocious password<\/a> (\u201c123456\u201d, anyone?) and go on their merry way. Until their accounts are hacked and their online personas are compromised or, worse, their identities and money are stolen. After all, it is human nature to disregard risk until disaster strikes.<\/p>\n<p>Indeed, it feels like you can\u2019t have it all; that is, many online accounts, each of which has a supremely <a href=\"https:\/\/www.welivesecurity.com\/2013\/07\/17\/how-to-create-strong-passwords-without-driving-yourself-mad\/\" target=\"_blank\" rel=\"noopener noreferrer\">strong<\/a>, unique and memorable password or passphrase. It is little wonder that our patience wears thin and we take mental shortcuts. Enter another coping strategy that greases the wheels of hacking \u2013 password reuse.<\/p>\n<p>While being antithetical to userland security, you can bet your last dollar that password recycling is invariably right up there with all the other <a href=\"https:\/\/www.welivesecurity.com\/2018\/02\/22\/sloppy-password-habits-among-young-brits\/\" target=\"_blank\" rel=\"noopener noreferrer\">most frequent and ill-advised offenses<\/a> committed by users in the realm of <a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/03\/authentication-101\/\">authentication<\/a>. Passwords created with another oft-used strategy, which involves slightly modifying the password for each account (\u201cpartial reuse\u201d), tend to be predictable and, thus, just as easy to crack.<\/p>\n<h2><strong>Why is password reuse so risky?<\/strong><\/h2>\n<p>The neighborhood that is the internet can be rather less than neighborly in many ways, doubly so when data breaches are a reality of our age. The breaches often expose login details that \u2013 if you use them to access multiple accounts \u2013 can be successfully exploited for attacks known as <a href=\"https:\/\/www.owasp.org\/index.php\/Credential_stuffing\" target=\"_blank\" rel=\"noopener noreferrer\">credential stuffing<\/a>. This becomes particularly troubling when an attacker uses stolen or leaked <a href=\"https:\/\/www.welivesecurity.com\/2018\/02\/26\/login-attempts-attackers-invade-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">access credentials<\/a> that belong to one account in order to break into another \u2013 often higher-value \u2013 account. Thanks to frequent password dumps, user\/password combinations are easy to come by, and often at little-to-no cost at that.<\/p>\n<p>If a breach hits and the credentials <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/11\/how-an-epic-blunder-by-adobe-could-strengthen-hand-of-password-crackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">aren\u2019t stored<\/a> with advanced <a href=\"https:\/\/www.welivesecurity.com\/2017\/05\/04\/short-history-computer-password\/\" target=\"_blank\" rel=\"noopener noreferrer\">salted-hash<\/a> functions (think, for example, a <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/11\/how-an-epic-blunder-by-adobe-could-strengthen-hand-of-password-crackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">hack against Adobe in 2013<\/a>), a strong password, or even a passphrase, may not be enough to thwart an account-takeover attack if you use that password to access multiple online services.<\/p>\n<h2><strong>Factoring in another factor<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1570\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2018\/03\/PasswordDay_2FA-1024x762.jpg\" alt=\"\" width=\"660\" height=\"491\"><\/p>\n<p>Many account-takeover attempts can be foiled with <a href=\"https:\/\/www.welivesecurity.com\/2014\/02\/11\/two-factor-authentication-what-is-it-and-why-do-i-need-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">two-factor authentication<\/a> (2FA). An added authentication factor provides an extra layer of defense beyond the simple passcode\/password\/passphrase and, in a way, fixes some of the inherent human foibles that are routinely exposed by our poor password choices.<\/p>\n<p>So far so good. However, many online service providers have yet to implement 2FA into their authentication schemes. (You can check the status of various websites vis-\u00e0-vis 2FA here: <a href=\"https:\/\/twofactorauth.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/twofactorauth.org\/<\/a>.) Additionally, as shown by a recent report about the adoption rate of 2FA among active Google accounts (<a href=\"https:\/\/www.theregister.co.uk\/2018\/01\/17\/no_one_uses_two_factor_authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">lower than 10 percent<\/a>), even if such an option has been available for years, most users simply don\u2019t take advantage of it, be it that they\u2019re unaware of it or apparently have bigger fish to fry.<\/p>\n<p>There are other <a href=\"https:\/\/www.welivesecurity.com\/2013\/02\/20\/who-goes-there-identity-and-multiple-authentication-factors\/\" target=\"_blank\" rel=\"noopener noreferrer\">forms of authentication<\/a>, of course, that may take some of the weight off our shoulders (and brains), be it biometrics (e.g. fingerprint or iris recognition) or algorithms to measure behavioral characteristics (e.g. typing rhythm) or others. Their availability and, by extension, adoption are nowhere near widespread, however.<\/p>\n<h2><strong>Is there another way, then?<\/strong><\/h2>\n<p>Well, yes, although it actually flies in the face of much advice dispensed by security folks. In 2014, Microsoft Research released a <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/password-portfolios-and-the-finite-effort-user-sustainably-managing-large-numbers-of-accounts\/?from=http%3A%2F%2Fresearch.microsoft.com%2Fpubs%2F217510%2Fpasswordportfolios.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">paper<\/a> that suggested a different tack. In thinking of various online accounts as somewhat of a continuum, the paper averred that some degree of password reuse is inevitable, but that it should be reserved for low-risk, low-value services. Put differently, the reasoning went that all accounts are not born equal and should, therefore, be divided into groups according to value. ESET Senior Research Fellow David Harley weighed in on this approach, while hinting at its potential pitfalls, in this insightful <a href=\"https:\/\/www.welivesecurity.com\/2014\/07\/23\/shaggy-dogma-passwords-social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\">piece<\/a>.<\/p>\n<p>On a different note, chances are that you won\u2019t cull your online accounts all the way down to whatever number you can manage easily with unique and strong passwords or passphrases. Nor will you probably be willing to engage in some serious mnemonics or aspire to eligibility for a memory competition.<\/p>\n<p>With that in mind, the easiest thing to do is, arguably, to put all of your passwords (strong and unique, of course) into a kind of digital safe. That vault is dedicated password management software that, ideally, encrypts and stores all of your passwords locally and offline.<\/p>\n<p>Indeed, password managers are all the rage in password security and, intuitively, it is hard to deny their merits. In addition, <a href=\"https:\/\/arxiv.org\/pdf\/1712.08940.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">recent research<\/a> found that password managers benefit both password strength and uniqueness, although apparently this strategy works only if the passwords are generated by the software.<\/p>\n<p>Either way, assuming that you trust the implementation of your password manager \u2013 and you wouldn\u2019t use it if you did not, right? \u2013 then its security is largely determined by the robustness of your master password. That\u2019s doubly relevant if you consider that you\u2019re effectively putting all your eggs, including some made of gold, into a single basket. That basket could, in fact, become a single point of failure.<\/p>\n<h2><strong>They shall not pass<\/strong><\/h2>\n<p>To be sure, passwords are flawed. Except that, in our internet era, there\u2019s no other ubiquitous method of user authentication. Having their impending <a href=\"https:\/\/www.zdnet.com\/article\/gates-the-password-is-dead\/\" target=\"_blank\" rel=\"noopener noreferrer\">demise<\/a> predicted back in 2004, passwords may well have outstayed their welcome. However, it appears that it will still be some time before they go the way of the dinosaurs.<\/p>\n<p>All told, some things in computer security are beyond the control of a regular user, but why not go and fix those that <em>are<\/em>? In a way, the persistently poor password practices of many other people give you a chance to be ahead of the pack. What\u2019s not to like?<\/p>\n<p>Source: &nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/05\/03\/recycling-reuse-password\/\">Welivesecurity<\/a><\/p>\n<p><span style=\"border-top-left-radius: 2px; border-top-right-radius: 2px; border-bottom-right-radius: 2px; border-bottom-left-radius: 2px; text-indent: 20px; width: auto; padding: 0px 4px 0px 0px; text-align: center; font-style: normal; font-variant-caps: normal; font-weight: bold; font-stretch: normal; font-size: 11px; line-height: 20px; font-family: 'Helvetica Neue', Helvetica, sans-serif; color: #ffffff; background-image: url(data:image\/svg+xml; base64,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); background-size: 14px 14px; background-color: #bd081c; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; border: none; -webkit-font-smoothing: antialiased; top: 2208px; left: 50px; background-position: 3px 50%; background-repeat: no-repeat no-repeat;\">Save<\/span><span style=\"border-top-left-radius: 2px; border-top-right-radius: 2px; border-bottom-right-radius: 2px; border-bottom-left-radius: 2px; text-indent: 20px; width: auto; padding: 0px 4px 0px 0px; text-align: center; font-style: normal; font-variant-caps: normal; font-weight: bold; font-stretch: normal; font-size: 11px; line-height: 20px; font-family: 'Helvetica Neue', Helvetica, sans-serif; color: #ffffff; background-image: url(data:image\/svg+xml; base64,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); background-size: 14px 14px; background-color: #bd081c; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; border: none; -webkit-font-smoothing: antialiased; top: 2208px; left: 50px; background-position: 3px 50%; background-repeat: no-repeat no-repeat;\">Save<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>World Password Day, celebrated on the first Thursday of every May, is a timely reminder of the fact that our passwords are the key to a wealth of personal information about us. It would be nice to imagine that if the various contenders for \u201cinventor of the password\u201d had known how much of a hassle<\/p>\n","protected":false},"author":5,"featured_media":1848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[164],"tags":[],"class_list":["post-445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Recycling is a must, but why would you reuse your password? - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recycling is a must, but why would you reuse your password?\" \/>\n<meta property=\"og:description\" content=\"World Password Day, celebrated on the first Thursday of every May, is a timely reminder of the fact that our passwords are the key to a wealth of personal information about us. It would be nice to imagine that if the various contenders for \u201cinventor of the password\u201d had known how much of a hassle\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-03T13:21:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:48:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/PasswordDay_Recycle-825x510.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Recycling is a must, but why would you reuse your password?\",\"datePublished\":\"2018-05-03T13:21:58+00:00\",\"dateModified\":\"2019-05-29T12:48:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/\"},\"wordCount\":1316,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/PasswordDay_Recycle-825x510.jpg\",\"articleSection\":[\"password\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2018\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/\",\"name\":\"Recycling is a must, but why would you reuse your password? - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/PasswordDay_Recycle-825x510.jpg\",\"datePublished\":\"2018-05-03T13:21:58+00:00\",\"dateModified\":\"2019-05-29T12:48:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/PasswordDay_Recycle-825x510.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/PasswordDay_Recycle-825x510.jpg\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recycling is a must, but why would you reuse your password?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/03\\\/recycling-is-a-must-but-why-would-you-reuse-your-password\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Recycling is a must, but why would you reuse your password? - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/","og_locale":"en_US","og_type":"article","og_title":"Recycling is a must, but why would you reuse your password?","og_description":"World Password Day, celebrated on the first Thursday of every May, is a timely reminder of the fact that our passwords are the key to a wealth of personal information about us. It would be nice to imagine that if the various contenders for \u201cinventor of the password\u201d had known how much of a hassle","og_url":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2018-05-03T13:21:58+00:00","article_modified_time":"2019-05-29T12:48:24+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/PasswordDay_Recycle-825x510.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Recycling is a must, but why would you reuse your password?","datePublished":"2018-05-03T13:21:58+00:00","dateModified":"2019-05-29T12:48:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/"},"wordCount":1316,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/PasswordDay_Recycle-825x510.jpg","articleSection":["password"],"inLanguage":"en-US","copyrightYear":"2018","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/","url":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/","name":"Recycling is a must, but why would you reuse your password? - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/PasswordDay_Recycle-825x510.jpg","datePublished":"2018-05-03T13:21:58+00:00","dateModified":"2019-05-29T12:48:24+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/PasswordDay_Recycle-825x510.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/PasswordDay_Recycle-825x510.jpg","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Recycling is a must, but why would you reuse your password?"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/03\/recycling-is-a-must-but-why-would-you-reuse-your-password\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=445"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/445\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1848"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}