Categorie: News

You’re smarter than that: please don’t let AI generate your passwords, here’s why

Artificial intelligence has now become an ubiquitous assistant in our lives, ready to draft emails, analyze complex texts, or plan trips.

With such versatility at hand, it might seem entirely natural to entrust these sophisticated tools with the https://gizchina.it/2026/01/149-milioni-dati-di-accesso-trapelati-cambia-password/”>creation of our digital access keys.

However, delegating one’s security to a chatbot represents a serious misjudgment that risks exposing your sensitive data to cybercriminals.

AI-generated password: the illusion of randomness and the entropy problem

Large language models (LLMs), by their very engineering nature, are trained to calculate and predict the next term in a sequence, drawing on vast quantities of historical data.

This precise characteristic makes them exceptional conversationalists, but it proves disastrous when asked to generate truly unpredictable sequences. True cybersecurity requires absolute entropy and uniform randomness, essential properties that conversational systems simply cannot simulate.

To confirm this serious vulnerability, a study conducted by the cybersecurity company Irregular. The researchers tested the most widely used systems, including ChatGPT, Claude and Gemini, discovering that the alphanumeric sequences returned to users are highly repetitive.

The results are clear: when subjected to Claude fifty distinct requests, the system produced only twenty-three unique keys. During the tests, a specific string was proposed as many as ten times, while the remaining ones exhibited extremely similar logical architectures and textual structures.

An unexpected gift for cybercriminals

This marked predictability delivers an invaluable strategic advantage to malicious actors.

Hackers routinely use automated software to launch the so-called dictionary attacks, a technique that involves trying to gain unauthorized access by rapidly testing enormous archives of common words and combinations already compromised in the past.

For an attacker, updating their malicious databases by inserting the limited standard variants proposed by chatbots requires practically no effort.

Consequently, even if the website you are registering on were to rate your new access key as complex and secure, its real effectiveness would be annihilated by the fact that hackers already have it in their ready-to-use lists. In short, it’s like reusing a leaked password.

Real cryptography against language models

To protect yourself adequately, it is necessary to understand the difference between text generated by a language model and true cryptographic generation.

Traditional password managers do not “invent” characters following probabilistic or cognitive schemes. Instead, they communicate directly with the operating system to extract bits generated through rigorous mathematical processes.

These mechanisms rely on elements of real entropy sourced from hardware, thereby ensuring the complete absence of patterns traceable by attack software.

The path to truly authentic and impregnable protection passes solely through tools designed for that specific purpose. Where web platforms and applications allow it, the passkeys represent the modern and airtight alternative par excellence.

Luca Zaninello

Appassionato del mondo della telefonia da sempre, da oltre un decennio si occupa di provare con mano i prodotti e di raccontare le sue esperienze al pubblico del web. Fotografo amatoriale, ha un occhio di riguardo per i cameraphone più esagerati.

Recent Posts

100 countries can hack your smartphone, UK government confirms

More than half of the world's governments today have at their disposal sophisticated commercial spyware…

9 hours ago

OnePlus Watch 4 is official with Wear OS and titanium case

A few hours after OPPO's event (which saw the launch of a slew of novelties…

9 hours ago

Amazon Tech Week: 7 days of deals across smartphones, tablets, PCs and more!

The period from April 22 to April 28 is dedicated to the best tech products…

10 hours ago

Motorola Edge 70 Pro Official: 144 Hz display, larger battery and many improvements

After the debut of Edge 70 and Edge 70 Fusion, it is time to say…

11 hours ago

DJI Mic 3 is a real gem for creators, now at an unbeatable price!

Lightness and versatility, without sacrificing professional performance: these are the characteristics of DJI Mic 3,…

14 hours ago

ASUS set to return to the tablet market with a competitor to the iPad Pro

The latest rumors reveal that the Taiwanese company is developing a high-end product named ASUS…

14 hours ago