Passwords and the secrets they contain

8 thoughts on “Passwords and the secrets they contain”

  1. Totally intriguing. I can see it. (This password history is bound to show up in novels…mysteries, crime novels, sci-fi or fantasies?) Cool post (especially as I had to come up with new password today..arrgghhh…life is so complicated these days)

    1. I haven’t read a novel in ages, but figuring out passwords can be a lot like breaking codes. Definitely a modern angle for all kinds of novels and movies.

  2. I must admit that one of my passwords will never be discovered by my wife, but I must admit I have alot of fun making new passwords and don’t have any trouble remembering them.

    They’re all stored away in ‘My Last Pass Vault,’ only trouble I have is recalling the password for the Vault because even the MLPV people do not have any idea what it is. O_o o_O

    1. All my passwords are stored in 1Password. Some of them are the nonsensical kind that a password manager will create for you. None of the ones I’ve devised myself are as interesting as the ones in the article.

  3. I use KeePass to store all my passwords as well as create random character passwords for me. At least 12 characters and up to 20 if allowed. My password to get into KeePass is a very long sentence. Before hacking became an everyday occurrence, there were about 3 different passwords I would use, and they each had some very deep, personal meaning for me.

    Interesting article. That had to be tough having to call everyone’s family asking for passwords so soon after the towers collapsed.

    1. The Cantor Fitzgerald / Howard Lutnick story was to me one of the most memorable to emerge from 9/11. I don’t know how he managed to function at all after what happened, much less have the company up and running just two days later.

  4. Yep, I do it too. My passwords are about 95% made up of combinations of personal stuff (not birthdays or anniversaries!) or of random sequences that have become meaningful through regular use. The Cantor Fitzgerald story interested me too. Curious, is it not, that the MS decryption team gave priority to interviews over brute analysis? What this says to me is that the conventional advice preached to us about the desirability of long randomized strings is wrong. Unless you’re keeping nuclear secrets, or are a corporation perhaps, nobody is going to spend days with a supercomputer crunching statistical possibilities to get into your checking account.

    1. The information obtained from interviews helped narrow the focus for the brute force attacks by suggesting possible components of the passwords. It would work the same way for hackers trying to get into your account. They can make educated guesses about your passwords based on your personal information (which is often included with your name when a major database gets hacked), and because they’re very savvy about the kinds of passwords people tend to choose. Randomized strings will always be more secure than anything related to your personal information, if only because — even with a supercomputer — they’ll take longer to hack. Hackers likely won’t waste time trying to hack your account if they think John Doe’s is an easier target.