TL;DR Use a password manager to generate and store complex passwords, or create passphrases using random words for memorability and security.
Passphrases vs. Complex Passwords
A common misconception is that complex passwords with random characters are the most secure. However, passphrases—combinations of random words—can provide strong security due to their length and unpredictability [2:4]
[3:1]. For example, "snoop dogg took a walk while drinking budweiser and picked up some dominos" offers high entropy and is easier to remember compared to shorter complex passwords
[3].
Password Managers
Using password managers like Bitwarden or LastPass can simplify password management by generating and storing strong, unique passwords for each account [1:2]
[3:2]. These tools encrypt your passwords, providing an additional layer of security
[3:4]. With a password manager, you only need to remember one master password, reducing the risk of weak or reused passwords
[2:8].
Creating Memorable Passwords
For those who prefer not to use a password manager, creating memorable yet strong passwords is possible by combining unrelated words and adding numbers or symbols [5]. For instance, removing vowels from two unrelated words and inserting a number or symbol can create a unique password
[5:1]. Alternatively, using lines from books, songs, or Bible passages can serve as memorable passphrases
[5:9].
Considerations for Password Strength
When creating passwords, consider the length and complexity. Longer passwords generally offer more security than shorter ones, even if they lack special characters [5:3]. Websites often have restrictions on password length and required characters, so it's important to tailor your approach accordingly
[3:1]. Always enable two-factor authentication where possible to further enhance security
[2:3].
Additional Tools
For those interested in generating passwords independently, tools like hpass.app can create secure passwords with minimal input [4:1]. Additionally, exploring resources on password entropy can help understand the mathematical strength behind different types of passwords
[2:1].
Because of this, I've been thinking a lot about how important it is to set up passwords properly these days. After hearing a lot of news about hacks and data breaches, I understand how important it is to have strong passwords for our online accounts. It's like a digital key that keep people from getting into our personal information on everything from social media to banks.Not only should you choose a strong password that is easy to remember, but it should also be hard for other people to figure out. I've learned that the best way to make your password stronger is to mix letters, numbers, and symbols and stay away from popular words or phrases. It's a bit like making your own secret code that only you know.What's the process you use to make your passwords?
I've been leaning toward using reputable password managers to make and keep track of passwords. These tools will make strong, one-of-a-kind passwords for all of your accounts and will also keep them safe. There is only one master password that you need to remember. This makes managing passwords much easier and safer.
I use a multi-layered method when making passwords. In addition to using a mix of letters, numbers, and symbols, I make sure that each password is unique to a single account. This way, if there is a breach on one site, it won't affect other sites. I also make sure my security is strong by changing my passwords every so often, especially for important accounts like email and banking.
I don’t remember any passwords, I use https://bitwarden.com/
Yes, making strong passwords is very important for internet safety. Using a password, which is a string of random words that are easy to remember and are broken up with numbers and symbols, has worked for me. For instance, Blue#Coffee7Rain! can be hard for other people to figure out but easy for you to remember.
I’ve always used what I thought was strong ones but the other day I stumbled upon a website that said that using a password like with four random words separated with spaces (ie: sunny rainbow batch riley) is the most secure password someone can have.
Really? Even more secure than 64 random letters/numbers/symbols?
I used to use sentences for passwords e.g iuseredditforpornonly Now I use bitwarden to randomly generate them.
Most places have a maximum number if characters for passwords.
That sample password is hilarious and I’ll probably use it, since nothing about it is true for me ☠️
I use a password manger, and use very long and very random passwords for almost everything. 98% of my passwords i dont know, I also enable 2FA when and were i can.
for the passwords i must remember, i most make sure i can remember them and that they are not guessable, and are as decent as i can make them.
whats the password manager? And… Do you believe password managers are “secure”? I know that I could block any connection to the internet from any progam that I install on my laptop but I haven’t ever tried one for this very reason.
It depends on your threat model, but generally password managers are considered secure I use bitwarden for most things and keepass for local stuff.
Put it this way, not using a password manager is probably weaking your security by orders of magnitude
You can do the math yourself if you want to compare. Each word from a common dictionary can be considered a “character” from a character set 5,000 units large, so four words give you 5,000^4 possibilities. Now compare that to, say, 16 characters from “A-Za-z0-9 and 20 special chars” = 56 characters, so 56^16 possibilities.
5,000^4 = 625 * 10^12 = 10^15 roughly
56^16 = 10^28 roughly
56^9 = 5*10^15 roughly
So four words equal nine characters from a common password.
that was very cool, thank you very much.
The important part is to remember that n words are to be calculated this way and not as “my four words have 35 letters so it’s like a 35 letter password” because hackers know this trick and will use dictionary attacks to brute force as well.
https://unix.stackexchange.com/questions/230673/how-to-generate-a-random-string
Of course Windows makes things difficult.
https://devblogs.microsoft.com/scripting/generate-random-letters-with-powershell/
helpful! thank you very much
https://keepass.info/help/kb/pw_quality_est.html check this out and read about password entropy
thank you
A common misconception is that your passwords should look like g5OoP?#e!
No. That password is hard to remember for a human, but for a computer it's extremely easy to bruteforce (browse through all the different possible options. In fact, that password contains merely
possible options which would take somebody with good access to GPU's only around a week to guess
However, if your password was a strange sentence, such as
It would have over 100,000,000,000,000,000,000,000,000,000,000,000,000,000,000 different options and if you tried to bruteforce it with every single GPU on earth times a million, the universe would experience its heat death before you had explored even 1% of the possible options. (100 000 choices for a word, 9 words, 100k^9).
And you already remember that password.
LPT: Use a password manager like LastPass so that you don't have to remember all of your passwords.
I don’t think any of the places I have passwords allow for spaces or that many characters. Good tip though if they do.
It's more likely that someone will gain access to your computer than that they'll gain access to an encrypted storage location in the cloud.
Your passwords are encrypted in two ways in the cloud. First, it's encrypted on your computer, and then that encrypted information is put into the cloud provider's storage. They encrypt it a second time, to make sure that no one is getting access to their stuff(the state of your data as it is when they're handling it).
Your passwords are much safer in LastPass than they are in a plain text file on your computer. They're also automatically entered. One of the biggest ways people steal passwords is by tricking users into entering them into pages that look fake. One of the great things about LastPass is that it remembers your passwords for sites you've entered passwords on, and it puts a button on each form you've already filled, so all you have to do to fill it in is to click the button to fill it. You don't have to remember your password. And if you go to a site that looks real but isn't, you probably won't have entered your password on that site, and you'll probably get suspicious when that button to automatically fill isn't there.
Another great thing about LastPass is that it sets you up to have random passwords on every site, as they've always recommended, so you click LastPass' button to generate a password for the current site, and it generates it, fills it in, and saves it, all at once. You don't have to remember your site passwords at all or keep track of them at all. And if one of them happened to fall into the wrong hands, it wouldn't affect you so much, because your password will be different on every site.
LastPass also helps you by identifying sites where you've previously used the same passwords, and gently nudging you to change the password for that site. It's not a huge annoyance, just a different color to the LastPass button, but it helps. That helps you secure your old passwords.
And the last thing they provide is that they monitor sketchy websites to see if any of the names and passwords you've entered into LastPass have shown up on the lists of people's stolen names and passwords that get traded on those sites.
It's really worth every penny, and my mom who is not tech-savvy has a lot easier time using LastPass than she ever had using a text file like you are.
What about the requirement for a number and special character?!?!
Use this LPT to set the password for your password manager.
Brute force no longer works after accounts are locked out after so many attempts.
What is it that we’re trying to keep them out of that they can attempt every combination imaginable without triggering security flags?
Let say you use an email server. If they are secure your password and stored content on their server will be encrypted. When hacked they may lose your login name, encrypted password and the encryption process. The clever thing is that there is no easy way to reverse the encryption process. That's why when you forgets your password secure servers will ask you to create a new one. If they return your password to you expect their security to be shit. Anyhow the hard way to "reverse the encryption process" is to not reverse it but just run a lot of passwords through it and see if the resulting encrypted password matches any of the stolen encrypted passwords. Then they can log into your account with one try.
Wrong Password, try again
Wrong Password, try again
Reset Password
Password can't be the same as previous passwords.
DAMMIT!
But I have so many passwords to remember that the universe would experience its heat death before I memorized them all.
Use a password manager
A text file is not encrypted - if someone gets hold of it they have all your passwords. It's far less safe than something like LastPass which is encrypted so even someone with access to their systems can't read your passwords. There's also two-factor authentication in case someone successfully guesses or keylogs your master password.
A piece of paper would be more secure than a text file.
This sounds great until you realize just how many websites have maximum lengths for their passwords or limits on repeated letters or require symbols or don't allow spaces. I went through my few hundred passwords a few years back and changed them all to follow a similar length strategy as you show here only to be sickened by how often I wasn't allowed to make my password strong.
Try https://hpass.app. It is an open source PWA (Progressive Web Application). It is very easy to use, and with minimal user input generates highly secure, unique passwords for all sites you visit. Go to https://hpass.app/info.html for a full description.
Start by taking two words that absolutely do not have any relation
(Strawberry schedule)
Now combine the two words but remove all the vowels, then add a number and a symbol and now you have your password. Only you know the cypher. You could save the original cypher/# it to your notepad on your smart phone or write it down but as long as you remember the words + the number.
Strwbrryschdl8$
Or
Strwbrry5schdl!
You can duplicate this password as needed by changing the number and symbol, or repeating the process for combining words and removing vowels.
You could just pick three words and have a stronger password than doing complicated manipulation for two words.
Removing vowels from words is literally elementary level difficulty.
Using 3 words isn't strong in terms of password security. But i guess that's a matter of opinion, if you haven't had any experience in a password breach
Removing vowels from words is literally elementary level difficulty.
It still adds difficulty. Difficulty causes people to take easier routes to remember passwords.
Using 3 words isn't strong in terms of password security.
It's called a "passphrase", and the current NIST recommendations encourage the use of passphrases. Replacing letters with symbols and doing manipulation hurt usability. They are recommending longer and easier to remember passwords over shorter complex passwords. "Strawberry Butterball Schedule" has more entropy than "Strwbrryschdl8$". Entropy is how you measure the strength of a password. It is stronger.
Length equals strength! Special characters/caps, etc. add very little security if your password is shorter than 12 characters. A pass phrase, even without gibberish added, is stronger than a password. "My shoes are green with black laces." is 36 characters, including the period. Throw that in a password checker and see what it tells you.
LPT: use a random password generator
How will you remember it
Store it in a password manager.
No thanks, the password I used when I was 9 is my password forever
In addition: make passwords short sentences. A lot of websites and apps support upwards of 50 characters, so take advantage!
I use a Bible passage. Can also use lines from books or songs.
UPDATE: (also added in comments)
I've been using LastPass for almost 10 years now, so I 100% agree that password managers are the way to go to manage the hundreds of different logins that we all have now.
I should have probably clarified this originally, but this suggestion is really for those passwords you can't (or at least shouldn't) store in a password app, like the master password for the password app itself, your network login for work, or the password for your own personal computer. These should also be the passwords that you should probably be changing more frequently as well!
​
Take a line or two from one of your favorite songs and then use the first letter (or corresponding symbol and/or number) of each syllable.
So for example
"Always Look On The Bright Side Of Life" could be represented as
Awlotbsol @W1otbs0l aW10+b$01
etc etc
You may need to write it down at first, especially when you first create or change it and need to enter it twice. But after entering it a few times, all you need to do is remember the line of the song and you'll remember your password!
And for passwords you need to change frequently, just use the next line in the song as your next password!
InfoSec dudes always told me length is just as secure as the special characters, etc. So their advice for people was pick a phrase that uses the whole of the 14-28 character limit.
My VP told me he tends to uses expletives. So for instance for Gmail his password may be:
FuckingGmailBullshit2023.
His favorite was for a program at work he hated with a passion so his former password was:
IFuckingHateYouMuthafucker1
His goal was for something to so screw-up the desktop guys needed to ask for his password lol
I only know this because I've gotten a question incorrect on my yearly security training related to this multiple years in a row. They ask which PW is most secure, and the answer is some boomer looking nonsense like "idontneedapassword" and its the correct answer just because its way longer than everything else.
Modern password crackers know most people subdtitute A with 4 or @, I with 1, S with 5 etc. Those passwords crack almost as quickly as ones without special characters.
Simple math:
Password 1: mynameisjohnsmith is 17 characters long using plain lowercase letters - has 26^17 combinations.
Password 2: xq7$L9p& is 8 letters long using captials, numbers, and special characters too and has 64^8 combinations.
Password 1 format has about 4 Billion times more combinations than password 2. If a supercomputer could crack password 2 in 1 second, it would take over 120 years to crack the first password.
I think that was the point of the xkcd comic referenced earlier.
Yeah but you also have to satisfy the requirements of the password which almost always wants a special character. I just use ch@racter5 !nstead of l33ters if necessary to use my easier to remember phrase.
The issue with that is that it makes it way harder to remember, without actually making it that much harder to crack (because any dictionary attack is also going to include common substitutions). Now you need to know which o you replaced with an @, or was it a 0? Did you swap an i or an l with a 1, or maybe it was an e with a 3.
I use 1Password and it's amazing.
Every login I have has a 15-20 unique password!
They could but how would they know what my phrase is? Ultimately I choose 4 words and put them together with some numbers and a symbol and that’s been sufficient for years. Probably time I change it but the hacker would need to know where spaces are included and how long each of the words are. Brute force can only go so far and when you throw 24 digits it starts to get too hard to crack in an efficient time for the hacker
The is the real life hack! It saves your passwords and you can use a long password with all the variations of password requirements! There’s even mobile version. I’m a huge Keepass fan.
Haven't multiple password managers been compromised? Kinda defeats the purpose to keep all your eggs in one basket. Memory or physical keys are the only internet proof solutions I'm aware of.
https://www.wired.com/story/lastpass-breach-vaults-password-managers/
> "Security practitioners universally emphasize that the situation with LastPass shouldn't deter people from using password managers in general."
Human memory is incredibly fallible. I'm not going to remember the logins to my nearly 400 accounts. Keeping them all on a piece of paper also leads to creating terrible passwords
Just because some password managers have been hacked doesn't mean they shouldn't be used. Educating yourself on how they function and finding a trustworthy organization is worth everyones time.
I'd recommend checking out /r/Bitwarden. I knew very little about internet security 2 years ago when I switched from LastPass to Bitwarden and had terrible passwords that were repeated. Being involved in that subreddit has greatly helped me learn more about this area of my life and help others.
We had a discussion at work about using a password manager AND adding something unique to the end of the password that you entry manually. Eg password manager stores z0?!aP5 but the password is actually z0?!aP5FukU Makes auto changing passwords etc a bit more tedious but could be a good idea?
I've been deep in password breach databases for the past month (yes, the legally available ones for research), and I need to share something that's been bothering me.
We've all been taught to create passwords like "P@ssw0rd123!" - uppercase, lowercase, numbers, symbols. Checks all the boxes, right?
Here's the problem: hackers know this too.
I analyzed 50,000 real passwords from recent breaches and found:
THE "STRONG" PASSWORD MYTH
Everyone follows the same patterns:
- First letter capitalized: 68% of passwords
- Numbers at the end: 42%
- Year of birth or "123": 38%
- Exclamation point as the special character: 31%
When everyone follows the same "random" pattern, it's not random anymore.
THE PASSWORD THAT BROKE MY BRAIN
I found two passwords in the breach:
"Dragon!2023" - Marked as "very strong" by most checkers
"purplechairfridgecoffee" - Often marked as "weak"
Guess which one appeared 47 times in the database? And which one was unique?
The four random words would take centuries to crack. The "strong" password? 3 days with modern GPUs.
WHAT I LEARNED BUILDING MY OWN GENERATOR
Most password generators suck because they use Math.random() - that's not actually random, it's pseudorandom. If someone knows the seed, they can predict every password.
I built one using window.crypto.getRandomValues() - actual cryptographic randomness. But here's the thing: even with perfect randomness, if you're only generating 8-character passwords, you're still screwed.
THE UNCOMFORTABLE TRUTH
The best password is one that:
You'll never remember (so it's truly random)
Is at least 16 characters
Is unique for every site
Lives in a password manager
Yeah, I know. We built all these password rules to avoid using password managers, and now we need password managers because of all the rules.
MY QUESTIONS FOR YOU:
What's the dumbest password requirement you've encountered? I'll start: a bank that required EXACTLY 8 characters. Not "at least 8" - exactly 8.
And how do you explain password managers to someone who writes passwords on sticky notes? (asking for my mom)
A password manager is a place where all of your sticky notes are encrypted, salted, and hashed preventing most hackers from accessing them, even in event of a breach.
All you need to remember is ONE strong password such as tigglebittys1886Fr33edumb$32$.
Remember that password. You can do it. Everyone can. You have one job. You never need to remember any other passwords again thereafter. If you can’t remember 1 fucking password, you are no longer my mom
Even better than that... make a passphrase! "That dude from my ECON 303 class smells like tacos."
Now that's a strong password AND simple to remember.
Choosing four random words is called dice words. It’s got decent entropy, but not the highest. And there’s a difference between four random words and four chosen words. But for most use cases if I recall correctly, you gotta go for five or better.
They tend to be longer and part of it is knowing the dictionary that they were chosen from (still computational expensive). We don’t know that the four random words were four random user words or if they were actually dice words.
I think what this is really about are password strength detectors. And they have limitations cause they don’t know how you generated your password..
If I recall correctly, even NIST is saying at this point that hard character requirements are a thing of the past (NIST 800-63B) and size matters
It also depends who the threat actor is and what kind of password it is.
Is it something that an attacker can easily try millions of different attempts against (such as a crypto wallet that was stolen by malware), then you want something reasonably complex.
If it's a service such as NetFlix or Gmail, an attacker is only going to get a handful of guesses before their IP is blocked or they start getting served CAPTCHAs or similar. Combine that with less technical users (such as my elderly parents) who might rarely type in their password, and you want something that is easy to remember, such as a group of common words or a sentence.
(Disclosure: I'm the author of a Diceware implementation.)
Yeah!
(Before I reply, you have saved me hours and hours and hours on the phone with people. Upper case L, lower case z, tilde.. what’s a tilde? Sideways squiggle? Didn’t work, let me repeat… so Thank you.)
There’s a reason password managers are wonderful, especially if you use them… lol.
But I think I was focusing more on the definition of what password strength is and what might be a good/bad pass. Even if you do the math on a keyboard when you add the special characters, you don’t get the kick you would think you were getting but adding an extra words worth of regular letters does.
most cracks come from a fault in the implementation (oracle attack comes to mind, struts, bad password storage), no? But like a file you can brute force reasonably inexpensively is kinda screwed anyway nowadays (nation state level fer sure)
Dicewords are rocking, but per word randomness was lowish iirc. Longer passwords get you there faster. Fer sure.
When I need to memorize a password, I do full sentences now. Like "My dog is the ruler of the house." Not random, but when you consider that you can't partially crack a hash and the infinite combination of words to make sentences, it's going to be nontrivial to crack.
It really depends. If I can make a bunch of assumptions the problem space might get significantly smaller.
Let's take your example string, you have 8 words. There's a little under 200k normally used English words, your choices fall in that list. 200k^8 is around 2.5^42 possible combinations. Let's assume an 8 bit character with a password length of 10. That's 2^80, an insanely larger number.
But you might point out, 2^8 is 256, and who uses 256 different characters? And you are right!
But 200k words contain a lot no one uses or even knows.
The average English speaker knows between 20k and 30k words. So lets assume 30k. That reduces the complexity of your word string to 6.5^35, and you picked very common words. I bet your words are in a set of say the 5k most commonly used words. If so your complexity just became pretty poor, on the order of 4^29. So let's look at characters. Let's say a 6 bit characters, that's 64, the common letters and symbols (base64). You now have 60 bits, or 2^60, still better than if your words were truly random from the 200k pool.
So, assuming I didn't make any mistakes in my math, you find that properly complex passwords of length are the way to go. Words might be a helpful trick to remember them, but they reduce your problem space by far more than most folks realize or are willing to calculate out.
As to hash cracking, it doesn't really matter. A string of words is a string of characters. It's just a question of how you order your inputs. A savvy attacker would start with what is most common, passwords lists, and words lists, but will then turn to brute force. Folks know about passphrases and dice words. They get checked just like character strings. They might know the complexity and size requirements from the originating site. Their game is about anticipating what you might pick in order to reduce problem spaces.
I created a python password generator to do just that - while including user-chosen punctuation (dashes, exclamation, comma, period, underscore, asterisk, what have you) and random user-chosen digits number. It needs some work, but it makes some pretty amusing "sentences" that are easy to remember but pretty high entropy. One of the things I want to do is add in an entropy checker, but that part stalled and I got busy. I should maybe get back working on it now that things have slowed down.
Edit: Clarity
Yeah no one is gonna guess that! What sites do you use that for? 🤣 Remember any comment you make online like this gives a threat actor information to try and crack your passwords. General concepts are ok but anything specific gives them advice on an approach to cracking it.
+1
it’s been known for a while and is so dumb most sites still require the “complex” characters and sometimes even limit which special characters you can use. I’m glad most orgs have gotten rid of having to change your password every 60 days as it’s been shown people will pick really simple passwords to remember or start writing it down.
Way to miss the point
4 words from a dict of 2000 is 2000^4, or about 2^44
A single word from a much larger dict (Randall uses a 64k dict) with common patters is only 24 bits of entropy
Now you could argue that 2^44 isn't enough nowadays. With bcrypt or scrypt you're likely to be limited to aout 2^8 hashes per second, so about 2^36 seconds or 2000 years to run through it.
A truely random 12 character password from a set of say 96 characters would be 2^79, or around the same as a 7 words from a 2000 word dictionary
Good luck getting people to actually choose and remember that type of password
You nailed it. To remember the password, it’s an easy way to avoid forgetting it.
This is such bad advice, this article goes over why.
Once they know the first part it's nothing to guess your other passwords. Just use a password manager, that is the answer to creating a strong password.
That just seems like a great way to be a victim of social engineering. You're simply combining your interests and anyone willing to do some work finding out how you make passwords and what you use could still gain access to your account.
I feel that secure passwords should be passwords you're comfortable showing others: they're too complicated to remember in short amounts of time, and they're absolutely random with no pattern between passwords. Whenever I give advice on passwords in particular, I show a password I use to emphasise what random is.
I pay $30 for LastPass and I think it's an essential 'gadget' everyone should have. Comes with password generators too.
This is terrible advice. The only way to make your passwords secure is to make them completely random for each website and store them in a password manager.
As soon as someone figures this pattern out, this password is useless.
>as thinking this would be good and I'll show my wife so she can stop using easy passwords. Instead I'm going to show her this so she knows what
>
>not
>
> to
Technically you are correct, but in reality people choose convenience over security that is why they create weak passwords and reuse them... so showing them how to create a stronger password than what they have now and one that is easy to remember is probably a practical advice...
It’s not. Because it’s reinforcing the idea that the way they’ve been doing things is mostly fine. It’s not mostly fine. It’s why people get their accounts broken into.
Any password advice that doesn’t center around making a different completely unique password for each account is shit. Because attackers know about the kinds of patterns used in these videos. They’re almost completely useless as password advice goes.
I was thinking this would be good and I'll show my wife so she can stop using easy passwords. Instead I'm going to show her this so she knows what not to do.
We live in a word where 123456 is the most common password... People choose convenience over security that is why they create weak passwords and reuse them... so showing them how to create a stronger password than what they have now and one that is easy to remember is probably a practical advice...
> People choose convenience over security that is why they create weak passwords and reuse them
ThriftyNickel wanted a password for sending me coupons in the mail.
Amazon wanted a password for access to my credit card.
Somewhere in here we should also be willing to hand out advice like "if the password is protecting nothing, then who cares what it looks like."
Of course showing them how to create a stronger password is practical but the way this video does it just isn't.
This is absolutely miserable. Who is upvoting this?? This is telling you to basically use the same password for everything and just change the last two letters. Are you kidding me? That’s among the worst things you can do to protect yourself.
Best possible practice is using a unique randomly generated strong password for every account and keep track of them in a secure password manager. Don’t follow what this dipshit animation advises.
Many people already know that it is more secure to use random characters, upper case, number, special characters and make it long... however they choose 12345 or qwe123 because convenience wins... even many software vendors don’t force complex password for the same reason. I am trying to give advice for addressing both convenience and security. It’s a balance. And again this is for the everyday user... and people should always turn on 2FA (which is off by default in many apps - again because convenience wins...)
Yes, LastPass is shit. That’s why I don’t recommend it. I recommend Bitwarden or KeePass (if you can deal with a horrid UI).
Bitwarden stores everything that gets sent to their servers with military grade encryption. Even they can’t access it. And even if they get hacked, the attackers still wouldn’t be able to decrypt the passwords without your master password (and they’ve had third party security audit to prove this). You can also self-host Bitwarden.
KeePass is my go to. Completely free, completely open-source. And it is only self-hostable. The database has military grade encryption and can be secure with master passwords, key files, and yubikeys for added security. And there’s no way for a government entity to force a company to reveal your passwords (because you own the infrastructure they’re stored on).
A common misconception is that your passwords should look like g5OoP?#e!
No. That password is hard to remember for a human, but for a computer it's extremely easy to bruteforce (browse through all the different possible options. In fact, that password contains merely
possible options which would take somebody with good access to GPU's only around a week to guess
However, if your password was a strange sentence, such as
It would have over 100,000,000,000,000,000,000,000,000,000,000,000,000,000,000 different options and if you tried to bruteforce it with every single GPU on earth times a million, the universe would experience its heat death before you had explored even 1% of the possible options. (100 000 choices for a word, 9 words, 100k^9).
And you already remember that snoop password.
According to Bitwarden's password testing tool "snoop dogg took a" takes centuries to crack. Seems anything longer than that is just adding inconvience and wasting time, especially for those typing on a phone keyboard.
Realistically speaking with each character added, the password should take multiple times longer to crack, it's probably just because bitwarden has a limit to how long it says it will take to crack something
Depends on your threat model. You also jeed to account for de-encryption breakthroughs.
why to remember? just use password manager like bitwarden or keepass
the master password ?
Just keep that in another password manager.
/s just in case
just remember that one password, its not difficult. or else just write it down and store in locker.
For my master, I use 2 different old school ID numbers, each at least 8 digits long, separated by special characters, then the first and last name of a friend’s grandfather, also separated by special characters, followed by my favorite 3 digit number, and then an exclamation point.
If this password was just numbers, the odds of guessing it would be 1 in 1,000,000,000,000,000,000,000,000,000,000,000,000. No idea what it would be when you add lower and capital letters, as well as special character, into the mix
Honestly, the issue is also repeated use of the same password since it takes just one leak of a long password for it to fail everywhere
Well that should be a given
This is not entirely true in this case. It can be true if the worlds have been chosen randomly from eg. 10000 worlds, but the probability of dogg after snoop is much much higher than 1/10000 and I am not counting that this is a real English sentence which probably limits what type of words will be after each other.
(Anyway passwords should be stored with intentionally slow hash (KDF) functions, so burte-forcing even the simpler passwords are useless.)
Margret_thatcher_is_110%_sexy
My anxiety crept up regarding security with Bitwarden, particularly with things like identities and cards, and it made me wonder if my master password was good enough or if it was bad.
So I'm wondering, in your experience, how do you choose your master password, and then how do you remember it afterwards?
Pick a random obscure quote you've never shared with anyone that you like and keep the first (or last if you're paranoid) letter of each word and keep the punctuation.
Example:
"He who hates does not know God, but he who loves has the key that unlocks the door to the meaning of ultimate reality." -MLK
password: HwhdnkG,bhwlhtktutdttmour.
I don't like this strategy because most people will not pick an obscure quote. There are way too many people with the password, tbontbtitq, for example. If the quote appears online as your example does, it is too guessable in my opinion. If it were obscure enough to not appear online, or it was something said by a non-celebrity (e.g. a parent), it would be better. There is also an argument to be made about the over-abundance of Ts and other common letters - certainly if the quote isn't particularly long.
I'm all for security best practices in theory, but thinking this is not good enough for a personal bitwarden account with a 20+ words citation is bordering on paranoia. Even if you're picking from Shakespeare's best of. Of course, this assumes you're not telling people that this is your strategy in a traceable way.
It also has the benefit of being somewhat 'recoverable' unlike the random words or gibberish randomized passwords people use. Forgetting your Bitwarden password SUCKS.
Compare this to bitwarden policy of telling you to write down your recovery key. That is going to be WAY more likely to lead to a compromised account than using a slightly flawed password generation strategy.
I'd recommend picking a quote with numbers in it so something like "one fish, two fish. Red fish, blue fish" would be "1f2f.Rf,bf". Personally my master password is something like this with an additional keyword and symbol, I found it pretty easy to memorize.
This is less secure and much more difficult to remember.
(This is coming from me, someone who used this method for my master password back when I was on LastPass)
Please just use a passphrase that is randomly generated
This is not random. Only password that is secure, is true random generated. Human is bad at randomness.
Use 4-5 word random passphrase, generated with Bitwarden or throw a dice. You will remember it in no time and this time you can depend on it's entropy.
I use the "Correct Horse Battery Staple" framework (if I may call it that way 😁). It's based on an XKCD comic. https://xkcd.com/936/
The idea is to that you make a passphrase instead of an overly complex password that you might easily forget. Focus is on length instead of complexity.
Since 2FA is enabled on my account I don't worry too much about the password looking "simple" (dictionary words, no numbers or symbols). Usually I get 20 to 30 characters which is fine for me.
For inspiration:
So does this mean the use of numbers and special characters is not important? And that we should prioritize length of pw no matter what?
the use of special characters and symbols are seen as more important than they are.
when a password is cracked their are different ways to approach how to guess or crack the password. many use the a dictionary attack the easiest attack
but password strength can not be measured just on it's strength but in how it is used. for instance if I required every user to have a long complex password some users will write it down close by or any of the other poor password management.
NIST used to recommend companies force their users to have complex passwords that change often. it turns out to be horrible advice, people having to change passwords often causes issues and if you force very specific rules those rules work against you.
take for instance you have guess a password you have no idea length or composition (upper/lower/number/symbol) there is no guaranteed "best approach"
BUT if you have to guess a password and you know they have to have 8-12 characters no "words" and you must have one upper, one lower, one number, one symbol. That is something we could have someone write a script to come up with every combo.
So while symbols and numbers to add complexity their complexity makes it harder to use.
my old master password was 10 characters and LEEET speak inspired numbers/letters/symbols bitwarden says it is 12 days to crack
my new master password is a rare phrase and is 18 characters all letters and would take 3 years to crack
TLDR: phrase or random word passwords are a minor trade off of strength for usability
This Wikipedia article does a good job at explaining the length-vs-complexity tradeoff, but basically these are about equally strong:
So, the best choice really comes down to if you will be auto-filling, typing, or remembering the password.
It doesn't mean numbers and special characters are not important. But it does mean a very long password with only letters is much better than a shorter one (let's say less than 10 characters) with numbers and symbols. Of course, a long password plus numbers and symbols is stronger.
The point is that you don't make it overly complex so it becomes difficult to remember. For example, passphrase (4 to 6 words) + symbol + 4 digits is fine. If you add words separators like dots or hypens that increases strenght in a simple way.
For example, KineticParticleEquallyMotion$23 is preferred than Tr0ub4dor&3 if you want to remember it easily.
As for personal strategy, I want the master password to be simple to type and simple to remember. The fact that Bitwarden supports 2FA makes me worry less about complexity as an attacker would need to obtain both.
For the rest of most of the online accounts I do create overly complex random generated passwords (over 32 characters, including numbers and symbols). With the password generator integrated into Bitwarden. Specially for those services without 2FA.
My router's WiFi password is very long. And I use QR codes if I need to add new devices (IoT devices are a special case). Something like:
673AEHKT#BgpRch*$!kkuGE86chAlqG!^Xl378Y!%d#z3^#WNO3C#dYjeY85gd7q
In summary, longer and simple beats shorter and complex. But long and complex beats long and simple. If ease of recall is the priority, choose long and simple.
I use the Correct Horse Battery Staple framework, but instead of using a generator or a random story that's hard to remember, I started with four words from my childhood street address. Then I transform those words by looking at synonyms, and memorable (but also perhaps a bit odd) word associations and homophones.
Imagine part of the address was 13 Mockingbird Lane. So my thought process might be:
13 is unlucky to some. Other unlucky things are opening an umbrella indoors and walking under a ladder.
In National Lampoon's Vacation, the parents sing "Mockingbird" in the car, and it was also sung by James Taylor and Carly Simon.
Lois Lane was played by Teri Hatcher, who was also Desperate Housewives. A hatcher can also be an egg incubator.
So 13 Mockingbird Lane could become "umbrella lampoon housewife", or "brolly tailor desperate", or "ladder vacation incubator", etc.
Easy for me to remember, but difficult for someone to figure out even if I told them my password is derived from where I grew up as a kid.
How to create a strong password
Key Considerations for Creating a Strong Password:
Length: Aim for at least 12-16 characters. Longer passwords are generally more secure.
Complexity: Use a mix of uppercase letters, lowercase letters, numbers, and special characters (e.g., !, @, #, $).
Avoid Common Words: Steer clear of easily guessable information like names, birthdays, or common words.
Passphrases: Consider using a passphrase made up of random words or a sentence that is easy for you to remember but hard for others to guess.
Unique Passwords: Use different passwords for different accounts to minimize risk. If one account is compromised, others remain secure.
Password Manager: Consider using a password manager to generate and store complex passwords securely. This can help you manage multiple passwords without the need to remember each one.
Recommendation: A strong password example could be a passphrase like "BlueSky!42Dancing@Moon". This combines length, complexity, and uniqueness. Always remember to update your passwords regularly and enable two-factor authentication (2FA) wherever possible for added security.
Get more comprehensive results summarized by our most cutting edge AI model. Plus deep Youtube search.