63

The way LLMs work is by approaching the most "average" response given any particular input. It's why everything written by an LLM looks similar and always has the same voice.

Anyways, shockingly, the Machine That Generates the Average Output is bad at unique passwords.

Of the 50 returned, only 30 were unique (20 duplicates, 18 of which were the exact same string), and the vast majority started and ended with the same characters.

Imagine that an LLM tries to fit its outputs into a bell curve of potential responses, with each character in the output aimed to be as close to the middle as feasible (with a small randomization factor so it's not always the exact same). A good password's bell curve ought to be a completely flat graph where any character is just as likely to be chosen as any other character.

Use a password manager.

you are viewing a single comment's thread
view the rest of the comments
[-] bobs_guns@lemmygrad.ml 6 points 1 day ago

And zero knowledge proofs operate by playing a game that shows that you know a secret without revealing any information about the secret. If you transmit the approximate length of the ciphertext that is no longer zero knowledge.

this post was submitted on 18 Feb 2026
63 points (100.0% liked)

Chapotraphouse

14279 readers
627 users here now

Banned? DM Wmill to appeal.

No anti-nautilism posts. See: Eco-fascism Primer

Slop posts go in c/slop. Don't post low-hanging fruit here.

founded 5 years ago
MODERATORS