Title: benjaminrwalsh's Replies | WordPress.org

---

# benjaminrwalsh

  [  ](https://wordpress.org/support/users/benjaminrwalsh/)

 *   [Profile](https://wordpress.org/support/users/benjaminrwalsh/)
 *   [Topics Started](https://wordpress.org/support/users/benjaminrwalsh/topics/)
 *   [Replies Created](https://wordpress.org/support/users/benjaminrwalsh/replies/)
 *   [Reviews Written](https://wordpress.org/support/users/benjaminrwalsh/reviews/)
 *   [Topics Replied To](https://wordpress.org/support/users/benjaminrwalsh/replied-to/)
 *   [Engagements](https://wordpress.org/support/users/benjaminrwalsh/engagements/)
 *   [Favorites](https://wordpress.org/support/users/benjaminrwalsh/favorites/)

 Search replies:

## Forum Replies Created

Viewing 1 replies (of 1 total)

 *   Forum: [Requests and Feedback](https://wordpress.org/support/forum/requests-and-feedback/)
   
   In reply to: [Password complexity verification flawed in WordPress 3.7](https://wordpress.org/support/topic/password-complexity-verification-flawed-in-wordpress-37/)
 *  Thread Starter [benjaminrwalsh](https://wordpress.org/support/users/benjaminrwalsh/)
 * (@benjaminrwalsh)
 * [12 years, 6 months ago](https://wordpress.org/support/topic/password-complexity-verification-flawed-in-wordpress-37/#post-4303271)
 * Actually, in my case it was requiring. That’s what was frustrating.
 * WordPress would not let me use a weak password. I’ve also tested passwords that
   are very complex containing both numbers, upper and lower case letters, symbols,
   and over 20 characters long, and WordPress thought these were “very weak”. The
   verification logic is definitely flawed. I can show you examples of *ridiculously*
   strong passwords that WordPress thought were weak.
 * The article you referenced is referring to using one sequential character, which
   is not what I’m talking about. Good point about “snipe” type vulnerability, but
   you would have to be very good to guess my password example watching me type 
   it at 80 WPM.
 * In my case, all my WordPress sites limit login attempts so requiring overly complex
   passwords doesn’t help anything.
 * If a password is too complex to remember, you have to type it or store it somewhere
   so you can remember what it is. In my opinion, that’s MORE of a vulnerability
   than having a password that’s complex but uses some sequential “padding” so that
   it’s easier to remember.

Viewing 1 replies (of 1 total)