News: 1771839009

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Every day in every way, passwords are getting worse and worse

(2026/02/23)


Passwords turn 65 this year. They became a feature of computer users' lives in 1961, with MIT's Compatible Time-Sharing System (CTSS). Before then, sysops were real sysops. All jobs went through them, one at a time, and access by others was forbidden by laws written on blocks of stone.

There are many, mostly sysops, who consider the introduction of direct user access as an abomination that has brought plague and chaos. They may well be right. Nevertheless, we are now stuck with this godless world. Passwords have hit retirement age, yet show no signs of going away, voluntarily or forcibly. They are, unhappily, getting worse at their job.

In the past couple of weeks alone, three new wrinkles in password security have appeared. Too-clever-by-half compilers [1]can optimize away protection against time-based password attacks , password managers that are supposed to be architecturally invulnerable to compromise [2]are less than perfect after all , and if you ask your AI to generate a strong password, you may get something [3]that looks right but isn't . You might not ask an LLM for a password, but if your password manager offers one, how's that generated?

[4]

That's not the only issue with password managers. Most people use those provided by Apple and Google. Both companies are American and must withdraw your access to their services if you annoy the wrong person. Digital sovereignty means never having all your passwords vanish, and you don't have it.

[5]

[6]

To be fair to our superannuated security strings, none of this is inherent to passwords. A properly specified and implemented password system, used by properly educated and motivated people, is as secure as anyone could want. You see the problem.

It is, of course, getting worse. The whole idea of agentic AI is pinned to the donkey by the assumption that your agents need your access rights to act on your behalf. There being no industry-wide best practices, no inherent management principles, or indeed inherent anything, this means giving AI agents your passwords – something that in a sane and godly world you would not do. Instead we've just seen agentic AI vibe-coded polycules like OpenClaw wink into existence to facilitate a global orgy of info-swapping among the robots, without a single silicon condom in sight. We only had time to say the first syllable of "What could possibly go wrong?" before it did.

[7]

The answer to keeping agentic AI secure is not to use it – let alone declare your OS as agentic from top to bottom, Microsoft. If you want to use it, then you'd better understand and properly implement privilege isolation, security segmentation, and all the other good things that you need when sharing your digital environment with a universe of mischievous djinn. Rewatch the Sorcerer's Apprentice scene from Fantasia for a refresher.

For everything else, the good news is that since the early 1960s, there has been considerable progress in making passwords much safer, even in the hands of humans, or not needed at all. Most of us use these techniques multiple times a day with local fingerprint or facial recognition on our devices. The weakest of passwords, the PIN, is plenty good enough when backed by three-strike or rate-limited locks.

So far, implementation and availability have been good enough that most users can use them reliably, mostly because it's quite hard to mess them up. Extending them into online services, however, is a different matter, as is managing service security on multiple devices. Two-factor authentication and passkeys are fine in principle, but far less so in practice.

[8]

Take two-factor auth. There are lots of options such as SMS or authenticator apps, device biometrics, or physical security keys, but all have different problems connected with social engineering, device or account loss, or spotty compatibility. Even availability isn't guaranteed where you might expect it. Your sparkling new Mac mini might sport a processor of unrivaled brilliance, but Apple forgot the fingerprint sensor. This is a complicated landscape to navigate for a naive user.

[9]Digital sovereignty must define itself before it can succeed

[10]The Linux mid-life crisis that's an opportunity for Tux-led transformation

[11]Infrastructure cyberattacks are suddenly in fashion. We can buck the trend

[12]Just the Browser is just the beginning: Why breaking free means building small

Passkeys, as currently implemented, are worse. Not because the underlying technology is flawed, but because they are hard to explain, easy to misunderstand, and typically offer options that can confuse not just the naive. They are a challenge-and-authenticate channel between a service and a device that relies on previously agreed cryptographically signed tokens. They can't be stolen or duplicated, and are strictly a per-device system. That's something that can be explained to anyone, although probably with different words, and the advantages made clear. Use passkeys, and you won't need passwords and you'll be safer.

What, then, does it mean when a system offers to store the passkey in the cloud-based password manager? What should you do if, as per usual, the system offers you a choice of passkey and some don't work? What if a service doesn't use passkeys at all?

When it all works, it can't be beaten. Go to an online service, the system fills in your username, dab the fingerprint sensor, and you're in. Getting to that stage when so many of the processes, vocabulary, and options aren't standardized isn't standard, and quelling the fear that if something goes wrong you'll be locked out is hard, even for those who've been authenticating since CTSS.

Like so many security woes, this is a solution that needs to be fixed itself. What's needed is a common message across the industry, a standardized user experience, and a commitment to customer education. But the industry – platform makers, service providers, app builders alike – is so high on the smell of its own flatus that it's completely in thrall to Apple Lightning Syndrome. There is no sin greater than voluntarily agreeing to a common standard just because it makes everything better.

Well, tough. Passwords are broken, the better technology is being pointlessly obfuscated, and instead of taking the time to sit in a room for a month and fix it, everyone is obsessed with experimental AI that is to security what anti-vax is to healthy children. Passwords aren't the only idea needing to be pensioned off. ®

Get our [13]Tech Resources



[1] https://www.theregister.com/2026/02/09/compilers_undermine_encryption/

[2] https://www.theregister.com/2026/02/16/password_managers/

[3] https://www.theregister.com/2026/02/18/generating_passwords_with_llms/

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZwzUj6bEVXH9gHcNHkmJwAAApY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZwzUj6bEVXH9gHcNHkmJwAAApY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZwzUj6bEVXH9gHcNHkmJwAAApY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZwzUj6bEVXH9gHcNHkmJwAAApY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZwzUj6bEVXH9gHcNHkmJwAAApY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[9] https://www.theregister.com/2026/02/16/digital_sovereignty/

[10] https://www.theregister.com/2026/02/09/the_linux_midlife_crisis_thats/

[11] https://www.theregister.com/2026/02/02/energy_infrastructure_cyberattacks/

[12] https://www.theregister.com/2026/01/26/just_the_browser_opinion/

[13] https://whitepapers.theregister.com/



laws written on blocks of stone.

Bebu sa Ware

Oh, I think we had progressed to half bricks with the optional sock for transgressors.

" properly educated and motivated people " — Arguably the proper application of the above half brick is both educational and motivational.

The Register 2024/11/17: "Will passkeys ever replace passwords? Can they?"

El.Mich.

Well. like in the real world one can have comfort or security with regards to IT-systems. But not both at the same time. Of course there are lots of possible compromises in between but they all come with some kind of trade-off.

Ah, and the article from my headline can be found here:

https://www.theregister.com/2024/11/17/passkeys_passwords/

Passkeys are not meant by FIDO to be better _for_ _:the_ _users_ but better for the companies offering them to their users to fence them into their respective IT-eco-systems even more than ever before. Who would have thought ...?! ;-)

Fortunately my brain seems to be able to remember several 40 - 64-digits passwords containing small and capital letters. numerals and ASCII-signs as well. And I at least do trust KeyPassXC without any kind of cloud usage. And KeyPassXC can even manage passkeys in principle though not on all websites depending on some "specialties" of the corresponding owner of the service. I think that I am quite well off! But other's mileage may vary ...! ;-)

And here we go again

Pascal Monett

Another push to replace passwords with .

Do you realize the difference between passwords and ? You can change a password.

Biometrics ? I can't change my fingerprints any more than I can change my face (hey, I'm not a multi-millionnaire).

Pass keys ? Managed by who ? Do they guarantee that they can't be hacked ? Ha !

Do you know the definition of Democracy ? It's the least worst system of government.

That's what passwords are. The least worst system of security.

I know how to manage my passwords. I never use the same password twice.

Leave my passwords alone. Especially from pseudo-AI.

Re: And here we go again

elsergiovolador

Presumably the should have a convenient backdoor for government.

Re: And here we go again

Doctor Syntax

And one that can't pos-s-s-s-sibly be accessed by anyone else.

Passkeys? Yeah, sure....

seven of five

> Go to an online service, the system fills in your username, dab the fingerprint sensor, and you're in.

Yes, what could POSSIBLY go wrong with that?

Re: Passkeys? Yeah, sure....

Denarius

and for some of us who do manual tasks like forestry, digging, thus having much skin abrasion, fingerprint devices dont work reliably. As most of us use multiple devices, easy _local_ transfer of data would be a godsend. Needless to say, its available in the "Cloud" which makes any thoughts of security futile

Hmmm

Will Godfrey

I've got quite a lot of passwords and pass phrases that I've created over a number of years. They are all completely different and to the best of my knowledge none have been compromised.

I consider being creative is the key. Such as the phase:

noklipy Ofaic jamwopPy

P.S. No I haven't used that one anywhere.

They are not stored in a password manager but on two USB sticks which are only inserted when a password is actually needed - some I remember anyway.

I have one important password that's only stored in wetware, and if it's ever lost then I have more important problems!

Pass* Options

An_Old_Dog

* I don't want biometrics, because while it is convenient, if there is a system breach, the data thieves have my encoded fingerprint, etc., ready to use in a replay attack (they just need to mod some software on their PC to make use of it). I can't get a new fingerprint, eyeball, etc.

* Passwords are fine for /me/, if the system doesn't limit them too much in length and complexity. The ones I use daily I have memorised. If I need one of the less-used ones, I decrypt my password file, look it up, use it, and overwrite (BleachBit) the plaintext file. I don't expect this to work for "ordinary" people.

Obligatory xkcd: https://xkcd.com/936/

* Whatever we use should not depend on a service on someone else's computer(s) ("The Cloud").

* Whatever we use should not depend on the Internet working, unless we already have a dependance on the Internet to connect with the host we desire to access.

* Whatever we use should not depend on a cellphone. I don't want my phone device, or any of its ID numbers linked to an account, due to privacy issues.

Decades ago when passwords were limited to eight characters or less, our mainframe had a program which generated quasi-random passwords, which while not true English words, were easily-pronouncable and -rememberable.

Obligatory xkcd: https://xkcd.com/936/

Re: Pass* Options

Doctor Syntax

I decrypt my password file, look it up, use it, and overwrite (BleachBit) the plaintext file. I don't expect this to work for "ordinary" people.

We ordinary people use something from the KeyPass family. Same idea, less messy and no need for bleach.

ChoHag

Passkeys are just passwords that are in a device I don't control instead of a head that I do.

I keep all my PWs in a text file called passwords.txt on the desktop

MaChatma CoatGPT 2.0

They aren't my passwords, obviously, but if some ne'er-do-well gets his grubby mitts on it then maybe it'll waste his time. This goes the + column of Life vs Mr Coat. All victories count, no matter how small.

I suppose...

DJV

...one way of creating passwords might be to use one of the many combinations of three words from What3Words that just happen to be on the grounds of your residence.

Of course, those of us in the British Isles can also use the four-word version from: [1]https://www.fourkingmaps.co.uk/

For example, the following might be an appropriate password for the "artist" formally known as a prince: pussypounder.weeb.pissartist.fartlozenge

[1] https://www.fourkingmaps.co.uk/

OAUTH would like a word

David Harper 1

"It is, of course, getting worse. The whole idea of agentic AI is pinned to the donkey by the assumption that your agents need your access rights to act on your behalf. There being no industry-wide best practices, no inherent management principles, or indeed inherent anything, this means giving AI agents your passwords – something that in a sane and godly world you would not do."

No industry-wide best practices? You mean, like OAUTH, which has been around for two decades?

Good

elsergiovolador

My password is as good as it was 8 years ago.

We have no choice but to live our lives as if we had free will.
-- amigojapan
( https://thewml.github.io/amigojapan-site/Self_quotes.html )