FR98 wrote:
A lot of actions today do not need a password to log into my account. For this forum Face ID is fine. For web, I can use my phone. Only on occasion is actual password is needed and you should occasionally change yours. I suppose more people are using password managers but that is something else to be hacked. Still, being in person with proper id should mean something but I guess being real person interacting with another human is not as trusted as what a computer believes.
Biometrics do not and cannot replace passwords preferably with two-factor authentication, or to passkeys. If (when) those biometrics fail, it’ll all fall back to passwords and two-factor or passkeys, too. More than a few people have lost access to their secured notes because they added a password, linked it to biometrics, and then biometrics somehow failed them. No password, no data access.
That you are not using a password manager can mean an exceedingly good memory, a notebook of passwords (works fine if your storage is secure), very few passwords, or (and this goes from easy to complete disaster just as soon as one copy leaks, and that happens on the attackers’ schedule) password re-use. Among other benefits, a password manager won’t auto-fill a phishing site. (Oh, and websites can read input fields before submission.)
In recent years, we are one of the weakest points in security, if not the weakest. We get phished. We get scammed. We lie. We get bribed or compromised. We get tired or busy and careless. We re-use passwords. We try to socially engineer access to others’ accounts. Whatever. And at a scale of billions, that then means checklists and consistent procedures and automation get implemented and used, too.
Your current password management approach failed. You were luckily able to recover access here, though that recovery required more time than would have preferred.
In the future, if you get phished, or if your credentials get re-used and credential-stuffed (and with either no two-factor, or otherwise compromised, or with some two-factor exhaustion or bypass attack), you will not be able to recover.
What can be done? Set up a legacy contact as appropriate, set up a recovery contact as appropriate, set up two-factor authentication, set up a notification address if you can, and use a password manager to generate robust and unique passwords, or to manage passkeys. (info: Better Securing Your Data, and Apple Account - Apple Community)