[Discuss] Most common (or Most important) privacy leaks
Kent Borg
kentborg at borg.org
Tue Feb 17 16:28:50 EST 2015
On 02/17/2015 04:03 PM, Edward Ned Harvey (blu) wrote:
> Well, writing down passwords for a little while until you memorize it
> is good. Writing it down and keeping it around changes it from
> something you know, to something you have. You might as well write
> down a 256-bit random key, if you're not going to memorize it.
Except a 256-bit random is very difficult to type. Real words are much
easier to type.
I have many of my passwords memorized, but it isn't a fixed set. My
memory is more of a cache. When I don't use a password for a while, I
will refer to my list, when I have been using it, I can type it by memory.
> Only takes 11 words to have cryptographic strength of 121. Everybody
> is capable of memorizing eleven words.
Harder than you make it sound. I have done it. It is easy to curve-fit a
concept through three or four random words, but it gets a lot harder
after that. It gets easy to start substituting a synonym or different
form for one of the words. Also, when typing blind (ie., no echo) it is
easy to make a mistake and not know where in the sequence you made it. I
have a quality encryption key that I type regularly, but not every day,
and it is surprisingly hard to do. There is an optimal level or rest and
caffeination that I don't quite know.
And speaking of encryption keys, don't confuse passwords with encryption
keys.
A password is something you check against some oracle that can throttle
the rate of its answers. That is why an ATM PIN of only 4-digits can
offer good security. But an encryption key of 4-digits is worthless for
anyone who is willing to work at it. Worthless as an encryption key but
good as a password. The two are very different. Don't confuse them.
-kb
More information about the Discuss
mailing list