Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday March 06 2019, @02:02AM   Printer-friendly
from the deep-seated-insecurities-and-paranoia dept.

Why 'ji32k7au4a83' Is a Remarkably Common Password

For too many people, moving the digits around in some variation of Patriots69Lover is their idea of a strong password. So you might expect something complicated like” “ji32k7au4a83” would be a great password. But according to the data breach repository Have I Been Pwned (HIBP), it shows up more often than one might expect.

This interesting bit of trivia comes from self-described hardware/software engineer Robert Ou, who recently asked his Twitter followers if they could explain why this seemingly random string of numbers has been seen by HIBP over a hundred times.

Have I Been Pwned is an aggregator that was started by security expert Troy Hunt to help people find out if their email or personal data has shown up in any prominent data breaches. One service it offers is a password search that allows you to check if your password has shown up in any data breaches that are on the radar of the security community. In this case, “ji32k7au4a83" has been seen by HIBP in 141 breaches.

Several of Ou’s followers quickly figured out the solution to his riddle. The password is coming from the Zhuyin Fuhao system for transliterating Mandarin. The reason it’s showing up fairly often in a data breach repository is because “ji32k7au4a83" translates to English as “my password.”

Related: The password “ji32k7au4a83” has been seen over a hundred times, and the password "ji32k7au4a83" looks like it'd be decently secure, right?

Now if only there were one super secure password everyone could use so we would all be safe.

[There is! But it would require over 55 hours (at 5 characters per second) to type it in. --Ed.]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by Anonymous Coward on Wednesday March 06 2019, @05:07AM (3 children)

    by Anonymous Coward on Wednesday March 06 2019, @05:07AM (#810576)

    I'm seeing all these comments, especially the one linking to XKCD and the one about unreadable passwords. The whole point of the articles is to point out that the above password is a standard encoding in Taiwan for the phrase "my password" in Chinese. Not very secure and I'm sure the blackhats that are out there, especially those targeting those who write using that encoding, were already well aware of this one and had it in their dictionary.

    Starting Score:    0  points
    Moderation   +3  
       Informative=2, Touché=1, Total=3
    Extra 'Informative' Modifier   0  

    Total Score:   3  
  • (Score: 3, Insightful) by maxwell demon on Wednesday March 06 2019, @07:05AM (1 child)

    by maxwell demon (1608) on Wednesday March 06 2019, @07:05AM (#810611) Journal

    On the XKCD link: If there's anything about passwords, someone will post the link. It's just how the internet works.

    I didn't actually follow the link because I'm reasonably sure it's the "correct hose battery staple", again.

    --
    The Tao of math: The numbers you can count are not the real numbers.
    • (Score: 2) by FatPhil on Wednesday March 06 2019, @07:59AM

      by FatPhil (863) <reversethis-{if.fdsa} {ta} {tnelyos-cp}> on Wednesday March 06 2019, @07:59AM (#810626) Homepage
      Or was it "right ass terminal clip"? (and I've not even bothered to pemute the words for extra wrongness.
      That's one reason I hate that XKCD - it overlooks the very point it's trying to make. We think, and remember, conceptually, rather than verbatim. Rndom common words are just as liable for misremembering as random characters. Also, his scheme is utterly childsplay to crack with rainbow tables.

      y advice is to understand the strengths and weaknesses of the common schemes, and then create a blend that is memorable to you. There's entropy in the choice of scheme, and "4 common words" probably carries as little entropy as "common word leetified followed by number".
      --
      Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
  • (Score: 2) by zocalo on Wednesday March 06 2019, @08:14AM

    by zocalo (302) on Wednesday March 06 2019, @08:14AM (#810629)
    Not come across this specific "encoding" before, but I did read an article a professional password cracker (e.g. for people who have "died" and supposedly locked up [bbc.com] millions of dollars of other people's crypto tokens in on their laptop) who discussed using similar mapping conversions like dvorak:qwerty so I'm pretty sure it's not exactly a revelation to those in the business of password recovery. The use of "My Password" rather than the more western "Password" does makes me think the cultural angle to dumb passwords could be leveraged to help reduce the search space quite significantly as well; some of the comments in other articles covering this implied literal use of localised versions of "correct horse battery staple" being quite common, for instance.
    --
    UNIX? They're not even circumcised! Savages!