Apple Passwords’ generated strong password format
Overall reaction to Apple’s format
- Many commenters think the CVC-style, syllable-based strong passwords are a good balance of security and usability, especially compared to fully random symbol-heavy strings.
- Others worry that constraining the structure (fixed length, positions of uppercase/digit, syllable patterns, hyphens) reduces entropy compared to a truly random password of similar length.
Entropy and security trade‑offs
- Several posters derive or reference estimates: Apple’s format is said to yield ~71 bits of entropy (up from 69 in the previous format), versus ~100+ bits for fully random same-length strings.
- Some argue this is still plenty when combined with modern slow hashing (bcrypt/Argon2/scrypt), making brute force impractical.
- Others are uneasy: 71 bits feels marginal if hashes are unsalted/fast-hashed (MD5/SHA), or for well-resourced attackers. Some advocate 80–100+ bits as a safer norm.
- There’s debate whether practical web attacks are limited mainly by password reuse and guessability, versus raw entropy. One side claims “no one brute forces” beyond low thresholds; others cite real hash-cracking and password spraying.
Usability, ergonomics, and edge devices
- Strong theme: random special characters are painful on TV remotes, VR keyboards, game controllers, cameras, VNC consoles, mismatched keyboard layouts, or low-quality on‑screen keyboards.
- Syllable-like chunks, mostly lowercase, and avoiding tricky symbols are seen as a big usability win; several people share horror stories where complex generated passwords were nearly impossible to enter.
- Some want ambiguous characters (O/0, l/1, etc.) excluded entirely; others say Apple mitigates this with monospace fonts and slashed zeros.
Alternatives: passphrases and other generators
- Many advocate real-word passphrases (Diceware, xkcd-style), sometimes with small deterministic embellishments (one capitalized word, a digit or symbol suffix) to satisfy legacy rules.
- Others prefer simpler generators: only lowercase (or lower+upper+digits) but longer, or pronounceable-password tools and base58 schemes.
- Some note that adding more words usually adds far more entropy and is easier to remember than fiddly format randomization.
Broken site rules and ecosystem issues
- Extensive frustration with archaic site policies: banned characters, mandatory symbols but tiny allowed sets, short maximum lengths, silent truncation, disabled paste, on‑screen keypads, frequent forced rotations.
- Apple’s open-source “password rules” database and
passwordrulesHTML attribute are highlighted as attempts to adapt generators to inconsistent site requirements, though coverage is incomplete. - There’s tension between praising Apple’s UX focus and concern that platform-level choices may pressure smaller sites and tools to conform.