← Back to Library

Your passwords are useless!

In an era where computing power has exploded a thousand-fold since the 1990s, a single, decades-old relic remains the gatekeeper to our digital lives: the password. The Hated One argues that this relic is not just outdated but actively dangerous, posing a threat to global GDP that rivals the economic disruptions of the 1920s. This is not a gentle nudge to use stronger characters; it is a forensic dismantling of the entire authentication model, asserting that the only way to stop getting hacked is to have nothing left to hack.

The Illusion of Control

The core of the argument rests on a brutal calculation: human behavior cannot keep pace with machine speed. The Hated One writes, "The technology has far surpassed the level of protection passwords can offer but we are still using them only with the non-binding recommendation of just try to make them more complicated." This framing is effective because it shifts the blame from the individual user to the system itself. We are asked to perform an impossible task—managing dozens of unique, complex credentials across dozens of devices—while adversaries wield trillions of guesses per second.

Your passwords are useless!

The author illustrates this asymmetry with the rise of sophisticated phishing. It is no longer about crude Nigerian prince scams but about pixel-perfect clones of legitimate sites, where the only giveaway might be a missing letter in a domain name. As The Hated One notes, "All it takes is for your brain to freeze for a second on an autopilot and not notice the difference between an rn and an m and your pond is gone." This observation is chillingly accurate; the cognitive load required to verify every URL is unsustainable for the average human.

"Half of your password security depends on making sure you do everything right... and the other half is completely outside of your control."

This split highlights the fundamental flaw: even if a user is perfect, the system is not. The Hated One points out that companies store passwords in centralized databases, making them prime targets. "Eighty percent of hacking related data breaches involve compromising passwords," the author states, citing the Facebook scandal where half a billion passwords were stored in plain text. The argument here is that hashing—a one-way encryption function—is insufficient because it does not solve the centralization problem. If the database is breached, the game is over.

Critics might argue that multi-factor authentication (MFA) via SMS or apps provides a sufficient bridge, but the author dismisses this as a bandage on a bullet wound. Recovery questions are labeled a "complete joke," and password resets are described as a "56 success rate" nightmare that drives users toward convenience over security.

The Case for Decentralization

So, what replaces the password? The Hated One proposes a radical shift from centralized secrets to decentralized keys. The solution is not biometrics, which can be spoofed or stolen, but public key cryptography. "The best way to avoid getting hacked is to have nothing to hack," the author writes, introducing the concept of passwordless authentication via the FIDO (Fast Identity Online) protocol.

The mechanics are elegantly simple yet mathematically robust. Instead of sending a secret to a server, the user's device holds a private key that never leaves the hardware. The server only holds the public key. "The online service verifies that you hold the authentication on your device and it is you who is requesting that the website is legitimate," explains The Hated One. This reverses the trust model. The server does not need to protect a database of secrets; it only needs to verify a cryptographic signature.

This approach inherently defeats phishing. Because the cryptographic key pair is unique to the specific domain, a clone site cannot trick the authenticator. "If an attacker creates a clone on a different domain... vital will reject their challenge," the author asserts. This is a critical distinction: the security is baked into the protocol, not the user's vigilance. The implementation relies on hardware tokens, such as USB keys, or native device security, ensuring that the "authenticator never leaves your device ever."

The Path Forward

The piece concludes by acknowledging that while the technology exists, adoption is lagging. The Hated One notes that "sites that do not support it are lagging behind," urging readers to check the 2FA directory for services that support hardware tokens. There is a strong emphasis on open-source hardware, recommending keys from Nitrokey and Solo Key over closed systems like YubiKey, arguing that "you have to trust the firmware they sell you" with proprietary devices.

"Passwords are inherently insecure so what's the solution? It's simple: we kill the password."

This is the piece's most striking declaration. It cuts through the noise of "best practices" to demand a structural overhaul. The argument gains strength from the sheer inevitability of the trend; as remote work becomes the norm and computing power grows, the password becomes an increasingly fragile link in the chain.

Bottom Line

The Hated One makes a compelling, evidence-based case that the password is a failed technology that we are clinging to out of habit rather than necessity. The strongest part of the argument is the demonstration that human error is not a bug to be fixed but a feature of the current system that cannot be patched. The biggest vulnerability lies in the friction of adoption; convincing millions of users and thousands of enterprises to switch to hardware keys is a monumental logistical challenge. Readers should watch for the gradual rollout of FIDO2 standards in major browsers and operating systems, as this will likely be the tipping point that finally renders the password obsolete.

Sources

Your passwords are useless!

by The Hated One · The Hated One · Watch video

it's the roaring 20s only 100 years later and the world has a big problem like one to six percent of the global gdp problem the biggest culprit behind it goes by a simple name the password passwords have been the default authentication method for decades and not much has changed about that except we went from counting computing power in megahertz to gigahertz no one even noticed i know but that's a thousand-fold increase just for computers in consumer devices the first computer ever to beat a world chess champion did it in 1997. that's a quarter of a century ago in 2013 the nsa and other advanced adversaries were able to brute force passwords with trillions of guesses per second it can literally take less than a second for a computer to go through the possibilities and pull that password out information in this video can help people be more secure so make sure it reaches as many people as possible share it comment like and help me stay afloat by donating some crypto or becoming a patron thank you the technology is far surpass the level of protection passwords can offer but we are still using them only with the non-binding recommendation of just try to make them more complicated think about it half of your password security depends on making sure you do everything right create and manage complicated but unique passwords for each of your accounts that should periodically change every few months store your password somewhere safe with properly encrypted backups you should rotate every time you make a change in any of the dozens of your accounts and you need to make sure that all of the devices and software you're using to store your passwords is up to date and your system isn't compromised and that you will never fall a victim of a phishing attack and that last one oh boy let me show you how difficult that can be phishing is far more sophisticated than just the nigerian print scams you get in your emails here we have an example of a phishing website this one has the green lock icon it's the ch domain the website is completely identical to the protonmail website so i'm clear right well if where to look and you look carefully you'll catch the fish this isn't the protonmail website this is just a ...