{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifijzq7nqt7stlr5izdqspoz2rppdkfbpe5nwxaqnxvuv6rh76smy",
"uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mltpzuxq5mv2"
},
"path": "/t/master-password-backup/37745?page=2#post_21",
"publishedAt": "2026-05-14T20:27:10.000Z",
"site": "https://discuss.privacyguides.net",
"textContent": "lyricism:\n\n> ignoramous:\n>\n>> It is fine the way password managers vend them out, with sufficient _entropy_.\n>\n> I think the issue is just that you can’t really measure entropy of a non-random password. Cryptographic entropy is a property of the mechanism by which the password was generated, not the password itself. That’s why a passphrase of x characters has less entropy than a password with x characters. If someone creates a password that’s just their name any entropy estimate will be inaccurate. You need a secure random method of generation for any entropy estimates to be accurate.\n\nEntropy can be calculated.",
"title": "Master Password Backup"
}