Sort:  

It is indeed and, like many crafts related to application of math and algebra in information technology, it is subject to critical errors when guidelines, best practices and tested knowledge are ignored. Just like cryptography, no one should invent Yet Another Algorithm because the good ones have been validated by decades of robust application. Password management is subject to the same rules.