Its not the idea of not having unique usernames thats in question here...its the hypothetical implementation thats, for lack of a better word, retarded.
6/20/2009 9:34:33 PM
You were initially incoherent and continue to reflect a poor comprehension of what I'm suggesting. I hope it doesn't offend you when I say that I haven't put a lot of stock into your thoughts or ideas on the matter, and don't intend to.
6/20/2009 9:49:33 PM
lol nice trolling, I'm taking notes
6/20/2009 10:07:43 PM
Hurry up and start that other thread. I'm really anxious to see what kind of hypothetical applications you can come up with that would benefit from shared usernames on any level.
6/20/2009 10:15:33 PM
6/20/2009 10:19:13 PM
I'm going to assume,Tiberius, you were just trolling or high or something and that a detailed explanation of your post's retardedness is unnecessary[Edited on June 20, 2009 at 11:02 PM. Reason : asdfsdf]
6/20/2009 11:01:55 PM
6/20/2009 11:36:39 PM
^do you not think people would intentionally test passwords that resulted in low security strength to crack other peoples accounts?If there are 10,000 accounts named "Sarah" it can't be that hard to run a dictionary attack against it and find at least one matchP.S. It would make it much more convenient for malicious users, instead of running attacks on an email address, they get to try against thousands of users at once! Brilliant! [Edited on June 20, 2009 at 11:43 PM. Reason : l]
6/20/2009 11:40:44 PM
Hey: check my edit and consider the probabilities of the events you're proposing to be fatal flaws before you suggest they're fatal flaws. I did it before I posted the original comment, which is why I find this clueless bullshit tiresome.If there are 10,000 accounts named "Sarah", then the username "Sarah" should have a password length requirement 2 characters longer than an unshared username for the probability of brute force success to be roughly the same, if you assume roughly 100 characters are permissible in the password. THIS WAS ADDRESSED ON THE FIRST PAGE YOU ILLITERATE COCKSUCKING SACK OF STUPID.Anyway, I'm done with this for real unless someone with a clue has anything to add. I apologize for shitting up this thread, I should have made a second thread for this it seems.[Edited on June 20, 2009 at 11:51 PM. Reason : .]
6/20/2009 11:45:59 PM
Consider the case of Facebook under your conditions:1.) 10,000 people with the username "Sarah"2.) One of them is at least a dumbass and sets their password to "password"Are you telling me that no one else is able to use the word "password" as a valid password? If not, ok, but still, anytime someone tries to log in as a "Sarah," what keeps them from trying out stupid passwords like this on their account?Also, the possibility of a brute force attack is greater when you are trying against a base of 10,000 "Sarahs" as opposed to individual email addresses.Instead of taking this personally, try to explain how it is possible that the above will never be an issue.
6/20/2009 11:54:49 PM
Do you even know what a password strength requirement is? It typically involves a dictionary word check, which rules out every counter argument that has been proposed so far without further discussion. It involves character class requirements, which further reduces the probability of a collision. It finally involves a password length requirement, which as I've stated can be variable to reduce the exposure to brute force as necessary, or it can be of static length large enough to provide a low probability of collision in highly shared usernames to the desired rate.Quit dragging me back into this dumb ass argument unless you've got an equation that illustrates a highly probable failure scenario which can occur in a malicious context. Note that the "birthday problem" equivalence I noted earlier has pretty much no relevance in malicious contexts.[Edited on June 21, 2009 at 12:08 AM. Reason : I really don't want to have to do math to prove a point I never considered open for discussion]
6/21/2009 12:01:15 AM
6/21/2009 12:10:46 AM
Sometimes it's cool to admit you had a dumb idea. I see this is not one of those times.
6/21/2009 12:15:51 AM
Fine, I'll do some fucking math.Let's say the character space is 54 characters. I picked it random, substitute your own if you like, it's usually larger.Let's say the length requirement is 12.Without shared usernames the probability of a collision when attacking a fixed username is 1 / 54^12:.000000000000000000001626577955With a username shared by 10,000 users ( * 10000):.000000000000000016265779550000With password length increased by 3, still shared by 10000 users ( * 1 / 54^3):.000000000000000000000103298401-- 106,581,410 petabytes of password data alone must be transmitted to guarantee a collision.Even without compensating, with a password length requirement of 12 it's already pretty much never going to happen on a remote access system.With a more typical password length requirement of 8:.000000000000013830883443250585 - unshared username.000000000138308834432505850000 - shared username-- 74.505806 gigabytes of password data alone must be transmitted to guarantee a collision..000000000000000878352095923549 - shared username, +3 password length for highly shared usernameThoughts? Ignorance misrepresented as thoughts? Unrelated comments?[Edited on June 21, 2009 at 12:35 AM. Reason : .]
6/21/2009 12:27:36 AM
You just don't get it. I don't think anyone is trying to prove that what you want to do isn't mathematically possible.Just that it's a FUCKING HORRIBLE IDEA.Give it up already.
6/21/2009 12:32:47 AM
So you're arguing that usernames of the form "xoxolilhotty6969" are preferable to aliases you actually identify with? Yet another possibility I never considered.You must also be forgetting that Facebook effectively did use a "shared username" system where you often used other attributes than login name to identify your contacts. This is the entire reason the discussion made it into this thread.You people are intolerably dense.
6/21/2009 12:39:45 AM
You're confusing the naming system used to identify users to one another with the naming system used to identify users to the login system.If you really can't see why having the same username for login purposes would be a horrible idea, then you really are beyond help.
6/21/2009 12:46:18 AM
6/21/2009 12:50:09 AM
You're making a fool out of yourself
6/21/2009 12:52:32 AM
At least if someone had the username of xoxolilhotty6969 they would be able to say "my name is xoxolilhotty6969 on facebook" and as completely retarded as you may think that is, people would be able to find them because they are the only one.But if everyone else is allowed to pick the same username, ...you know what? I feel like I'm arguing politics with an 8 year old. I said it before, and this is my last post in this thread. If you can't figure out one of the HUNDREDS of reasons why this is a bad idea, then you really are an absolute retard. I'm done trying. If this really was a troll, then GG all day long. But I do think you're really that stupid./out.
6/21/2009 12:55:32 AM
It's honestly difficult to determine whether you guys are trolling or just on the same page as RSXTypeS.
6/21/2009 12:56:15 AM
Shit, wrong thread. [Edited on June 21, 2009 at 1:09 AM. Reason : /really out]
6/21/2009 1:07:57 AM
6/21/2009 6:58:30 AM
Even in the worst case with a static minimum password length of 8 characters, it's hardly a probability significant enough to worry about. See above.There's further no need to increase the length requirement for the accounts created before a length requirement increase as they represent a minority of the shared accounts and would not reduce the password strength substantially. I would demostrate this mathematically, but then "nobody would be arguing" against that aspect again.Finally, and let me note that I am stating this with the utmost disdain for your intellectual capacity and experience, you may have (but more than likely have not) heard of a (none-the-less fairly well known) feature in password-based authentication systems called an "invalidation". Go ahead and check out your control panel, you may notice the check box in the user properties panel beside "User must change password at next logon". IF the previous conditions somehow magically ceased to compute in this universe, the "TIME MACHINE" used to "RETROACTIVELY MAKE THE FIRST SARAH'S PASSWORD STRONGER" would be a boolean field in the database requiring the user to set a new password at the next logon. Fucking idiot. Go play with some plastic grocery bags and suffocate.[Edited on June 21, 2009 at 8:06 AM. Reason : .]
6/21/2009 7:56:20 AM
12 character password requirements? Inexplicable failures on password strength checks? Constant password updates required?Is this a social networking site or a fucking corporate intranet?
6/21/2009 8:30:38 AM
While Tiberius has proven that the likelihood a username would have a password conflict is mathematically improbable, it can still happen. And I don't think a site like Facebook would be dumb enough to take this risk. I think their system of using email addresses is pretty good; no two people can have the same email address.
6/21/2009 8:41:09 AM
6/22/2009 1:12:18 AM
Regardless of how you're logging in to whatever website you run, if you're not using OpenID, you're doing it wrong. With Facebook giving us unique aliases, it makes it so they can become an OpenID authentication provider, and not just a consumer... which is pretty cool. They joined the OpenID foundation a couple months ago, so this is probably something you'll see soon.Conceivably, not only could you start putting "facebook.com/mycrappyband" on all of your crappy band's promo fliers... you can also authenticate yourself as facebook.com/mycrappyband on external websites, which gives a pretty sweet user experience.Currently you can link your facebook account with an OpenID 2.0 provider (they don't support OpenID 1.1 for some reason).]
6/22/2009 6:26:32 AM
7/2/2009 4:00:56 PM
7/2/2009 6:35:27 PM
cool another post. gg fb http://www.facebook.com/note.php?note_id=114979233919
8/18/2009 1:38:21 AM
screw facebook. they took away my username
8/18/2009 7:21:33 AM
Does anyone really give a crap about facebook usernames? I mean yeah most of us have one now, but I don't ever pay attention to the damn things. I completely forgot about them until I saw this post again.
8/18/2009 9:29:36 PM
I would give a ball hair or two to work on that network.
8/18/2009 9:33:59 PM
I feel pretty damn cool having facebook.com/philihp
8/19/2009 12:51:02 AM
8/19/2009 1:35:58 AM
8/19/2009 2:22:21 AM
i'm pretty happy with facebook.com/joshzilla
8/19/2009 2:27:54 AM
^^^hehe, if it weren't for my geographical limitations, i'd be all over that.
8/19/2009 9:22:23 AM
8/19/2009 12:26:41 PM