{"id":1826,"date":"2009-05-08T19:58:43","date_gmt":"2009-05-08T23:58:43","guid":{"rendered":"http:\/\/blogs.n1zyy.com\/n1zyy\/?p=1826"},"modified":"2009-05-08T19:58:43","modified_gmt":"2009-05-08T23:58:43","slug":"passphrases","status":"publish","type":"post","link":"https:\/\/blogs.n1zyy.com\/n1zyy\/2009\/05\/08\/passphrases\/","title":{"rendered":"Passphrases"},"content":{"rendered":"<p>So you all know the usual password advice. But I saw someone talking about &#8220;passphrases&#8221; the other day, and got interested. Many&mdash;but far from all&mdash;sites just take whatever you type and run it through a one-way cryptographic hash, so that it&#8217;s stored in a fairly uniform ASCII hash. If my password is blank, or if it&#8217;s the most secure password on the planet, it&#8217;s going to look about the same in the database: something like 32 characters of text when it&#8217;s passed the one-way hash.<\/p>\n<p>I think the word &#8220;password&#8221; brings in some artificial limits. How many people have a space in their password? I bet it&#8217;s astonishingly low, and probably because &#8220;password&#8221; implies that it should be a word.<\/p>\n<p>But if it&#8217;s all just going to be hashed, meaning that there&#8217;s no reason for a maximum password length, why can&#8217;t, &#8220;I actually used a couple sentences for my password. Crack this one, n00bs!&#8221; be my password? I have some rarely-used passwords for very important things that are probably 12+ characters long, and extremely good passwords in terms of things that a cracker wouldn&#8217;t guess anyway. But I have so stop and think. P@$$w0rDee as a (fictitious) example: anything derived from &#8220;password&#8221; is bad, but ignore that. It&#8217;s ten characters, which is pretty good, and it&#8217;s slightly altered from the word it&#8217;s based on. And it&#8217;s easy to remember &#8220;password-ee.&#8221; But was it an @ or a 4 for the first &#8220;a&#8221;? And was it the &#8220;r&#8221; or the &#8220;D&#8221; that&#8217;s upper-case? For the ones I use every day, it&#8217;s all muscle memory. But for the ones I use rarely, it might take me a full minute to type out a ten-character password, because I have to think. <\/p>\n<p>And that&#8217;s where, &#8220;I bet that you can&#8217;t crack this password&#8221; comes into play as a maybe-worthwhile idea. It&#8217;s a plain English sentence that&#8217;s foolishly easy to remember, with nothing &#8220;weird&#8221; about it to hamper my memory. The fact that it&#8217;s all based on simple English words is somewhat offset by the fact that it&#8217;s so unreasonably long for a normal password that password crackers wouldn&#8217;t even bother going out that far.<\/p>\n<p>I think it would also make thematic passwords easier. It&#8217;s bad practice to use the same password everywhere, but no one in their right mind is able to use a different password for every site they visit. But suppose I had, &#8220;I keep my money safe at the bank&#8221; for my bank, and &#8220;I take good care of my health and my privacy&#8221; as my password for my health insurance provider? (Again, these are fairly bizarre examples and you shouldn&#8217;t use anything close to them!) It&#8217;s much better if you mix in some non-normal-English: &#8220;I keep my money safe in el banco&#8221; helps slightly. &#8220;I keep my $$ safe in el banco&#8221; is better.<\/p>\n<p>There are lots and <i>lots<\/i> of places that don&#8217;t support this, and I&#8217;m not totally convinced that this is a great idea. But the concept has me pretty intrigued.<\/p>","protected":false},"excerpt":{"rendered":"<p>So you all know the usual password advice. But I saw someone talking about &#8220;passphrases&#8221; the other day, and got interested. Many&mdash;but far from all&mdash;sites just take whatever you type and run it through a one-way cryptographic hash, so that &hellip; <a href=\"https:\/\/blogs.n1zyy.com\/n1zyy\/2009\/05\/08\/passphrases\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1826","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/1826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/comments?post=1826"}],"version-history":[{"count":0,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/1826\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/media?parent=1826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/categories?post=1826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/tags?post=1826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}