Author Topic: If you opened a paypal account before you were 18, close it now.  (Read 5792 times)

Circle, Squarepay, and Stripe (if you're a vendor) are all pretty popular alternatives.

do most shopping sites (amazon, newegg, etc) / game platforms (steam, origin, etc) and others use that sort of thing though is the question? or do they use other services like paypal/bitcoin in order to actually buy for stuff? sorry if the question sounds dumb

If i have 2 accounts that i created but never did anything other than make them, can i just leave them to collect dust? I tried to close one of them but my acc is limited and i dont want to provide ssn photo id and the whole shabang just to close it.

do most shopping sites (amazon, newegg, etc) / game platforms (steam, origin, etc) and others use that sort of thing though is the question? or do they use other services like paypal/bitcoin in order to actually buy for stuff? sorry if the question sounds dumb
PayPal/alternatives are good if you need an easy way to receive money, especially as a freelancer.

The only time I buy stuff with PayPal is art commissions from freelance artists. For regular stores (like the examples you gave), just get a debit card. You need one anyways to link to PayPal.
« Last Edit: April 30, 2017, 08:34:55 PM by Headcrab Zombie »

If i have 2 accounts that i created but never did anything other than make them, can i just leave them to collect dust? I tried to close one of them but my acc is limited and i dont want to provide ssn photo id and the whole shabang just to close it.
if there's no balance in the account, it won't hurt anything to just abandon it


i made my original account when i was like 17, then i ran into that "prove yo stuff" thing that they make people do sometimes
i had tried to enable the add money option after my 18th bday

i called them and then after an info exchange they said to close my account because i made it underage but that i could make another one since i was 18 at that point

whatever i guess

Even if you're trying words in general, it's still very secure. A bruteforce attack, if the attacker knew it was in the form of 4 english dictionary words with some form of separator (Which would be hard for them to come across), would still have



around 10^20 passwords to guess before they found it.
yeah while that might seem like a lot, having 4 words with no special characters or numbers is not very secure at all. a dictionary attack is the most basic way to gain access to someones credentials, and if someone gained access to the database where it was stored (assuming they aren't hashed), it wouldn't take long for someone to gain access to your account (and others like it). its generally good practice to use randomized password generators that create long passwords with randomized characters (numbers, special characters, spacing), or having your own algorithm for making a secure password

and if someone gained access to the database where it was stored (assuming they aren't hashed)
...if someone gains access to a database of unhashed passwords, then it doesn't matter how good your password is

sorry about the bump but

PayPal/alternatives are good if you need an easy way to receive money, especially as a freelancer.

The only time I buy stuff with PayPal is art commissions from freelance artists. For regular stores (like the examples you gave), just get a debit card. You need one anyways to link to PayPal.

thanks for the advice but i was asking if circle, for example, uses services like paypal to exchange credit and money. probably misinterpreted the question a little

...if someone gains access to a database of unhashed passwords, then it doesn't matter how good your password is
i guess i worded that weird lol, i was just adding on that if the passwords were encrypted within the database (not hashed) itd still be easy to decrypt them

a 'guessing bot' trying to get into your account seems really impractical and I don't understand why making ridiculously long passwords are necessary

a 'guessing bot' trying to get into your account seems really impractical and I don't understand why making ridiculously long passwords are necessary
not as impractical as it sounds when bots have databases of leaked passwords and emails/usernames from hacked providers to use, or know that an account they are trying to break into is an admin account.

raw random guessing is pretty rare, admittedly

exactly, why hassle yourself with ridiculous passwords when there's a higher chance of it getting breached by a method much more effective? unless I'm wrong, websites nowadays limit your login attempts so a bot would be cut off from logging in before it gets even close to a password considered weak

exactly, why hassle yourself with ridiculous passwords when there's a higher chance of it getting breached by a method much more effective? unless I'm wrong, websites nowadays limit your login attempts so a bot would be cut off from logging in before it gets even close to a password considered weak
Most services also hash your password to protect it in the case of a breach. As your password is longer, it gets exponentially harder to determine it via a hash. That is why you use long passwords, weak passwords will be broken and they'll end up gaining access to all the accounts you used that password on (also why you should use unique passwords for all the accounts you can, password managers are saviors).


i guess i worded that weird lol, i was just adding on that if the passwords were encrypted within the database (not hashed) itd still be easy to decrypt them
Password hashing is standard now.
« Last Edit: May 01, 2017, 03:35:41 PM by Pecon »