Generator FAQ
Ko-fi

Password Security FAQ

Need a strong password right now?

Generate a Password →
Password Basics

What makes a password strong?

A strong password is long, unique, and random. Most people fixate on complexity rules, but length does more of the heavy lifting. A 20-character password made from random letters, numbers, and symbols is far harder to guess than a short password with clever substitutions like P@ssw0rd!. Unique matters just as much, because even a strong password becomes weak the moment you reuse it on another site. My rule is simple: use a different password for every account, and let a generator do the hard part. You can generate one instantly at PopcornPasswords — free, no sign-up required.

How long should my password be?

For most accounts, 16 characters is a good minimum, and 20 or more is better when the site allows it. NIST's latest guidelines (SP 800-63B Rev 4, released August 2025) now recommend a minimum of 15 characters when a password is the sole authenticator — up from 8 in earlier versions. Length has always been the primary factor in password strength, and that matches real-world experience. If you're using a password manager or generator, there's rarely a reason to stop at 12. For passwords you need to type yourself, a passphrase of 4 to 6 random words is usually easier to live with than a messy short string. You can generate both random passwords and passphrases at PopcornPasswords — free, no sign-up required.

Is 12 characters enough for a password?

Yes, 12 characters can be enough if the password is truly random, but 16 or more is a better default now. A random 12-character password drawn from a full set of letters, numbers, and symbols has about 4.76 × 10²³ possible combinations, which is a huge search space. The problem is people rarely create truly random passwords on their own. They make patterns, swap letters for numbers, or reuse old favourites. That's why I'd treat 12 as the floor, not the goal. If you want an easy win, generate a 16 to 20 character password at PopcornPasswords — free, no sign-up.

Should passwords have symbols in them?

Symbols can help, but they're not magic, and length matters more. Adding one exclamation mark to the end of a short password doesn't suddenly make it strong. NIST's latest Rev 4 guidelines now explicitly say organisations "shall not" impose composition rules like requiring symbols — because people respond with predictable patterns like Password1! or Summer2026!. Symbols are useful when they're part of a genuinely random password generated for you, not when they're bolted onto a weak one. So yes, use symbols if the site allows them, but don't obsess over ticking boxes. Focus on a long, random password first. You can generate that kind of password at PopcornPasswords — free, no sign-up required.

What is password entropy?

Password entropy is a rough way of measuring how unpredictable a password is. In plain English, it asks how many possible guesses an attacker might need to try if they know the rules used to build the password. More randomness and more length usually mean more entropy. A 16-character random password from a 94-character set works out to about 105 bits of entropy. A human-made password that looks clever often has much less because humans are predictable. One catch: NIST notes that entropy is easy to calculate for random data but much harder to estimate for passwords people invent themselves. That's why generated passwords beat handmade ones so often.

Password Generators

Are password generators safe to use?

Yes, a password generator is safe if it uses a proper security-grade random source and doesn't send your password anywhere. The big difference is how the generator gets randomness and where the work happens. A browser tool that runs locally with the Web Crypto API is a very different thing from a shady page that logs inputs or pushes everything through a server. Good generators create passwords you would never think of yourself, which is exactly the point. They also remove the temptation to recycle old favourites. If you want a simple local option, PopcornPasswords generates passwords in the browser — free, no sign-up required.

How do password generators work?

Password generators work by picking characters or words at random using a secure source of randomness. A good generator does not "invent" clever-looking passwords — it samples from a character set or word list in a way that avoids patterns. That matters because attackers are very good at spotting human habits like names, dates, keyboard walks, and common swaps. With a browser-based tool, the work can happen right on your device using the Web Crypto API, so the password is made locally instead of on a remote server. That's the model PopcornPasswords uses, and it's why generated passwords are usually much stronger than handmade ones.

Is it safe to use an online password generator?

Yes, it can be safe, but only if the generator runs locally and has no reason to collect what it creates. "Online" is the part that confuses people. A page can live on the web and still generate everything inside your browser without sending the password anywhere. That is very different from a service that creates passwords on a server, stores logs, or mixes in analytics you can't inspect. My quick test is simple: if the tool explains how it works, uses the browser's crypto functions, and doesn't ask for sign-up, that's a good sign. PopcornPasswords fits that model, and you can use it free with no account.

Random password or passphrase — which is better?

A random password is better for stored logins, and a passphrase is better when you need to remember or type it often. If a password manager is doing the remembering — and it should be, because you will not memorise a random string of mixed characters — go with a long random string every time. It squeezes the most unpredictability into each character and avoids the patterns humans fall into. If you need something for a master password, device login, or another password you'll actually type, a passphrase made of unrelated random words is usually easier to live with and still very strong when it's long enough. PopcornPasswords supports both styles, so you can pick the right tool for the job.

What is a passphrase?

A passphrase is a password made from several random words instead of one short string of characters. Done properly, it's not a quote, a lyric, or something meaningful to you. It should be a set of unrelated words chosen at random, like "velvet crater lemon orbit" rather than "ILoveMyDog123". The strength comes from total length and unpredictability, not from being poetic. Four truly random words from the EFF's 7,776-word list give you roughly 3.66 quadrillion combinations, and six words jump far beyond that. Even shorter word lists produce strong passphrases when combined with numbers and mixed capitalisation. That makes passphrases a solid choice when you need something memorable. You can generate passphrases instantly at PopcornPasswords — free, no sign-up required.

Password Managers

Should I use a password manager?

Yes — a password manager is not optional, it is essential. You will not remember a truly random password with mixed uppercase, lowercase, numbers, and symbols, and you should not try to. CISA says to use one, and NIST's guidance is built around allowing password managers because strong, unique passwords are not realistic to memorise at scale. A good manager stores your logins in an encrypted vault, fills them when you need them, and stops you from reusing the same password across twenty sites. The catch is that your master password now matters a lot, so make it long and turn on MFA. Options like NordPass, Bitwarden, and 1Password all do this well.

Are password managers safe?

Yes, reputable password managers are generally much safer than reusing passwords or storing them in notes, spreadsheets, or your inbox. They do create a central point of failure, so the quality of the product matters, but good ones use strong encryption, support MFA, and are designed so the provider should not be able to read your vault contents. NIST says password managers offer both greater security and convenience, which is the right way to look at them. They are not magic. You still need a strong master password, MFA, and enough caution not to hand that master password to a phishing page. Used properly, they improve your security by a lot.

What if my password manager gets hacked?

If your password manager gets hacked, the outcome depends on what was actually exposed and how the product is designed. A breach headline does not automatically mean attackers can read every saved password in plain text. Well-designed managers encrypt your vault before it leaves your device, and some add extra protections so the provider cannot decrypt it for you even if their systems are breached. NIST also points out that many managers support MFA and are built so cloud services cannot access the vault contents directly. Your best defence is a long master passphrase, MFA on the vault, and unique passwords inside it.

What is the best password manager in 2026?

There isn't one best password manager in 2026 — there's a best fit for how you work. If you want a strong free and open-source option, Bitwarden is the easy recommendation because its free tier includes unlimited passwords on unlimited devices. If you want a polished paid experience, 1Password is excellent and has a well-documented security model. NordPass is also a solid commercial option — full disclosure, it's a recommended partner of PopcornPasswords. My honest advice is to pick the one you'll actually stick with, enable MFA, and move your important accounts into it this week instead of reading ten more comparison pages.

Is a free password manager good enough, or should I pay for one?

A free password manager is good enough for many people, especially if it gives you unlimited passwords, cross-device access, and solid autofill. Paid plans usually make sense when you want extras like family sharing, secure attachments, emergency access, breach monitoring, or better account recovery options. The real mistake is thinking "free" means "not worth using" and then falling back to reused passwords. In practice, a decent free manager is far better than no manager at all. Start with the free plan, move your core accounts into it, and only pay when a specific feature would actually make your life easier or your setup safer.

Common Mistakes & Threats

Is reusing passwords really that dangerous?

Yes, password reuse is one of the fastest ways to turn one breach into ten. If one site leaks your login and you've reused that same password on your email, banking, shopping, or social accounts, attackers will try it everywhere else. This is called credential stuffing, and it works far more often than people think because humans love familiar passwords. A unique password for every account breaks that chain completely. That's why security advice keeps repeating the same boring rule: different password, every site, every time. If you want to fix reuse quickly, generate fresh ones at PopcornPasswords and save them in a password manager like NordPass.

What is credential stuffing?

Credential stuffing is when attackers take usernames and passwords leaked from one breach and try them on lots of other sites. It is not a clever Hollywood hack — it is mostly automation and scale. The attacker bets that some percentage of people reused the same password on other services, and they're usually right. That means the weak point is often not how strong the password looks, but whether it is unique. A totally random password reused across sites is still a problem. The fix is simple but annoying: one password per account, stored in a password manager, plus MFA on your important services.

How are passwords actually cracked?

Passwords are usually cracked through guessing, stolen databases, phishing, or malware — not by someone "breaking encryption" in real time. Online guessing attacks hammer login pages with common passwords and reused credentials. Offline cracking happens after a site breach, when attackers get hashed password data and try huge numbers of guesses locally. Phishing skips the cracking step and just tricks you into typing the password into a fake page. Malware does the same by stealing what you type or what your browser stores. That's why the basics still matter: long unique passwords, a password manager, MFA, and enough scepticism to check where you're signing in.

Should I write my passwords down on paper?

Writing a password down on paper is not ideal, but it can still be safer than reusing weak passwords everywhere. That answer surprises people, but a piece of paper in your home is not exposed to remote attackers the way reused logins are. The risk depends on where you keep it and what you write. A master password taped to your monitor is a bad idea. A recovery sheet locked away at home is far more sensible. I'd still prefer a password manager for day-to-day use, but for backup codes or one critical master passphrase, an offline paper copy stored securely is reasonable.

How often should I change my password?

You should change your password when there's a reason, not just because the calendar says so. NIST's SP 800-63B Rev 4 (August 2025) is explicit: passwords "shall not" be required to change on a fixed schedule and should only be changed when there is evidence of compromise. Forced 30, 60, or 90 day resets often backfire because people make tiny predictable changes like Winter2026! becoming Spring2026!. That feels productive and does very little. A better rule is this: change passwords that are weak, reused, shared, exposed in a breach, or entered on a phishing page. Leave strong unique passwords alone until something happens that makes a reset worth doing.

Two-Factor Authentication & Extra Security

What is two-factor authentication?

Two-factor authentication is a second proof that it's really you, added on top of your password. Usually that second factor is something you have, like an authenticator app, your phone, or a hardware security key. CISA describes MFA as using two or more ways to verify identity, and states directly that MFA makes you 99% less likely to be hacked. The reason it's pushed so hard is that a stolen password alone is no longer enough to break in. Not all MFA is equal though — CISA ranks FIDO security keys as the strongest option, with authenticator apps a solid second. If your email, banking, and password manager do not have MFA turned on yet, start there first.

Is SMS two-factor authentication safe?

SMS 2FA is better than no 2FA, but it is the weakest common option and not my first choice. Text messages can be exposed to SIM-swap attacks, phone number hijacking, and some phishing workflows. CISA's guidance pushes organisations toward phishing-resistant MFA and notes that some MFA methods are vulnerable to SS7 issues and SIM swapping. So if SMS is the only option a site offers, use it. Don't leave the account unprotected out of principle. But when you have a choice, pick an authenticator app, and better yet, use a security key for your most important accounts.

What is a security key, and do I need one?

A security key is a small hardware device that proves you're signing in to the real site, not a fake one. It uses modern standards like FIDO and WebAuthn, which rely on cryptographic key pairs instead of codes you can be tricked into typing anywhere. That makes security keys one of the best defences against phishing. CISA specifically points to FIDO security keys as a form of phishing-resistant MFA, and FIDO describes passkeys and security keys as using public-key cryptography for safer sign-in. Do you need one? Not for every account. For email, your password manager, and anything high value, I think they're worth it.

Should I use biometric login like Face ID or fingerprint?

Yes, biometric login is great for unlocking your own device or password manager quickly, but it should be treated as a convenience layer, not your only safety net. NIST's guidance explains that biometrics are commonly used to unlock a secret stored on the device, often alongside a PIN. That's the right mental model. Your fingerprint or face is usually unlocking a local key, not replacing every other control. The upside is speed and habit, which means you're more likely to keep protection turned on. The downside is that biometrics are not something you can change if compromised. Use them, but keep a strong passcode, recovery options, and MFA in place too.

What is a recovery code, and where should I keep it?

A recovery code is a backup code you use to get into an account when your normal second factor is unavailable. Think lost phone, broken authenticator app, dead security key, or travel disaster at the worst possible time. Google's help pages describe backup codes as a fallback for when you can't get your normal verification codes, and each code becomes inactive after use. That makes them valuable enough to store properly. Don't keep recovery codes only inside the account they're meant to recover. Keep them offline, ideally on paper in a secure spot, or in a secure vault with a separate backup. Treat them like spare keys to your house.

Ready to create a strong password?

Generate a Password →