Micah Lee writes at The Intercept that "coming up with a good passphrase by just thinking of one is incredibly hard, and if your adversary really is capable of one trillion guesses per second, you’ll probably do a bad job of it. It turns out humans are a species of patterns, and they are incapable of doing anything in a truly random fashion."
But there is a method for generating passphrases that are both impossible for even the most powerful attackers to guess, yet very possible for humans to memorize. First, grab a copy of the Diceware word list, which contains 7,776 English words — 37 pages for those of you printing at home. You’ll notice that next to each word is a five-digit number, with each digit being between 1 and 6. Now grab some six-sided dice (yes, actual real physical dice), and roll them several times, writing down the numbers that you get. You’ll need a total of five dice rolls to come up with each word in your passphrase. Using Diceware, you end up with passphrases that look like “cap liz donna demon self”, “bang vivo thread duct knob train”, and “brig alert rope welsh foss rang orb”. If you want a stronger passphrase you can use more words; if a weaker passphrase is ok for your purpose you can use less words. If you choose two words for your passphrase, there are 60,466,176 different potential passphrases. A five-word passphrase would be cracked in just under six months and a six-word passphrase would take 3,505 years, on average, at a trillion guesses a second.
I recommend that you write your new passphrase down on a piece of paper and carry it with you for as long as you need. Each time you need to type it, try typing it from memory first, but look at the paper if you need to. Assuming you type it a couple times a day, it shouldn’t take more than two or three days before you no longer need the paper, at which point you should destroy it.
"Simple, random passphrases, in other words, are just as good at protecting the next whistleblowing spy as they are at securing your laptop," concludes Lee. "It’s a shame that we live in a world where ordinary citizens need that level of protection, but as long as we do, the Diceware system makes it possible to get CIA-level protection without going through black ops training"
(Score: 2) by Gaaark on Tuesday March 31 2015, @12:58AM
I think that the longer your password is,the harder it will be to crack, especially if the cracker doesn't know how long your password is.
Having a 7-10 character password with all kinds of hard to remember characters (ampersands, etc) is not as good as having an 18 to 24-30 character password of standard dictionary words strung together, especially if you can remember to salt it with odd characters (ampersands, etc).
horsebatterystaplecorrect
is not as good as horsebatterystaplecorr3ct
is not as good as horsebatterystaplecorr3ctbeerbash
my old passwords were about 8 characters long with odd characters
my new passwords are 18-26 characters long with whatever i can remember.
and if a website which hasn't done it's password protection properly (salted, hashed) is cracked, it all comes down to naught... the unsinkable just hit an iceberg.
That given, if a website is working with the NSA, they have your password.
And you are f*cked.
Up the back end.
With a popsicle.
Named Harry Dick... aka 'Chocolate Rain'.
And his friend.
Biggus Dickus... aka... Biggus Dickus.
--- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
(Score: 2) by stormwyrm on Wednesday April 01 2015, @08:31AM
Numquam ponenda est pluralitas sine necessitate.