BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Most common (or Most important) privacy leaks
- Subject: [Discuss] Most common (or Most important) privacy leaks
- From: kentborg at borg.org (Kent Borg)
- Date: Tue, 17 Feb 2015 16:28:50 -0500
- In-reply-to: <BN3PR0401MB1204605F9898F1746B711298DC2F0@BN3PR0401MB1204.namprd04.prod.outlook.com>
- References: <BN3PR0401MB12046B091F0FA6E67DDB34A2DC2F0@BN3PR0401MB1204.namprd04.prod.outlook.com> <54E366FE.3060806@borg.org> <BN3PR0401MB1204BCFBB4B81B46A3F6A020DC2F0@BN3PR0401MB1204.namprd04.prod.outlook.com> <54E37F9E.9040001@borg.org> <54E388A3.9080608@mattgillen.net> <54E391AE.2000304@borg.org> <54E39B78.1050909@borg.org> <BN3PR0401MB1204605F9898F1746B711298DC2F0@BN3PR0401MB1204.namprd04.prod.outlook.com>
On 02/17/2015 04:03 PM, Edward Ned Harvey (blu) wrote: > Well, writing down passwords for a little while until you memorize it > is good. Writing it down and keeping it around changes it from > something you know, to something you have. You might as well write > down a 256-bit random key, if you're not going to memorize it. Except a 256-bit random is very difficult to type. Real words are much easier to type. I have many of my passwords memorized, but it isn't a fixed set. My memory is more of a cache. When I don't use a password for a while, I will refer to my list, when I have been using it, I can type it by memory. > Only takes 11 words to have cryptographic strength of 121. Everybody > is capable of memorizing eleven words. Harder than you make it sound. I have done it. It is easy to curve-fit a concept through three or four random words, but it gets a lot harder after that. It gets easy to start substituting a synonym or different form for one of the words. Also, when typing blind (ie., no echo) it is easy to make a mistake and not know where in the sequence you made it. I have a quality encryption key that I type regularly, but not every day, and it is surprisingly hard to do. There is an optimal level or rest and caffeination that I don't quite know. And speaking of encryption keys, don't confuse passwords with encryption keys. A password is something you check against some oracle that can throttle the rate of its answers. That is why an ATM PIN of only 4-digits can offer good security. But an encryption key of 4-digits is worthless for anyone who is willing to work at it. Worthless as an encryption key but good as a password. The two are very different. Don't confuse them. -kb
- References:
- [Discuss] Most common (or Most important) privacy leaks
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] Most common (or Most important) privacy leaks
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Most common (or Most important) privacy leaks
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] Most common (or Most important) privacy leaks
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Most common (or Most important) privacy leaks
- From: me at mattgillen.net (Matthew Gillen)
- [Discuss] Most common (or Most important) privacy leaks
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Most common (or Most important) privacy leaks
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Most common (or Most important) privacy leaks
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] Most common (or Most important) privacy leaks
- Prev by Date: [Discuss] Most common (or Most important) privacy leaks
- Next by Date: [Discuss] Most common (or Most important) privacy leaks
- Previous by thread: [Discuss] Most common (or Most important) privacy leaks
- Next by thread: [Discuss] Most common (or Most important) privacy leaks
- Index(es):