From 0f347829413ebb2dba0c3477fa17288638d54132 Mon Sep 17 00:00:00 2001 From: Tommy Date: Sat, 21 Oct 2023 22:06:57 -0700 Subject: [PATCH] Update content/posts/android/Android Tips.md Co-authored-by: wj25czxj47bu6q <96372288+wj25czxj47bu6q@users.noreply.github.com> Signed-off-by: Tommy --- content/posts/android/Android Tips.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/android/Android Tips.md b/content/posts/android/Android Tips.md index cdd432d..f4c47df 100644 --- a/content/posts/android/Android Tips.md +++ b/content/posts/android/Android Tips.md @@ -52,7 +52,7 @@ Pattern unlock is extremely insecure and should be avoided at all cost. This is If you trust the hardware enforced rate limiting features (typically done by the [Secure Element](https://en.wikipedia.org/wiki/Secure_cryptoprocessor) or [Trusted Execution Environment](https://en.wikipedia.org/wiki/Trusted_execution_environment)) of your device, a 8+ digit PIN may be sufficient. -Ideally, you should be using a 8-10 word [diceware passphrase](https://en.wikipedia.org/wiki/Diceware) to secure your phone. This would make your phone unlock practically impossible to bruteforce, regardless of whether there is a proper rate limiting or not. +Ideally, you should use a randomly generated passphrase of 8 words or longer to secure your phone. These are practically impossible to bruteforce with current technology, regardless of the efficacy of any ratelimiting that may be present. ## Setup Auditor