Here's an idea. We should change the word "password" to "passphrase" to subconsciously discourage people from using a single word.
@RainBoxRed6 жыл бұрын
Iwentotheparkto_day.
@aanon40196 жыл бұрын
iwenttotheparktodie
@shawniscoolerthanyou6 жыл бұрын
I agree. I've changed my password to "passphrase" in solidarity.
@zenon86275 жыл бұрын
Came here from Edward Snowden s recommendations?
@kafosoo5 жыл бұрын
"Passcode" would probably be even better then.
@mcol36 жыл бұрын
The 12.9 bits he mentions comes from the fact that log2(7776) = 12.9.
@nO_d3N1AL6 жыл бұрын
I was wondering that, thanks!
@birbdrkhadka59445 жыл бұрын
My twinkle
@ErebuBat5 жыл бұрын
Thank you!
@simonmultiverse63493 жыл бұрын
But none of my dice have a 6 on them! They have a 9 instead! What should I do?
@simonmultiverse63492 жыл бұрын
@@__Brandon__ Excuse me... my eleven-sided die has two number 9 s. Where is the missing number 6 ?
@crystalschuller27305 жыл бұрын
"We're talking nation-state level security - you can choose to protect against them, but they might just visit you instead." Haha this is the logical step that's been missing in so many conversations I've had with cybersecurity enthusiasts - they seem to think the FBI is reading their emails but pay no mind to physical security. True story, I had one friend who insisted on 20-character randomly generated passwords, but wouldn't even bother lock his front door when he left the house because we were going "just up the street."
@jamesedwards39234 жыл бұрын
That is not the point. The problem is nation states and criminal organizations. They both have access to cloud computing services. Also bitcoin farms and hacking farms can use the same technology. The same equipment a government uses a civilian can buy unless the equipment is classified. You think there is a difference in terms of capacity? You are wrong. We're not talking petty theft. We are talking about criminal organizations who make a fortune off of your stolen data.
@xXx_Regulus_xXx2 жыл бұрын
@@jamesedwards3923 I don't know, I think you're the one missing the point here. A high-entropy password is great, but you are vulnerable against a $5 wrench attack and if your adversary is willing and able to use that method, your secure password stops mattering.
@jamesedwards39232 жыл бұрын
@@xXx_Regulus_xXx In most states in the United States. Getting a 'legal' gun is easy. If a criminal organization comes with a $5 wrench. I can unload on them. Got to love the Castle Doctrine :) ! Although in my state and city in particular. Has stricter gun laws. Thinking they are going to stop criminals. Yet in a bunch of videos and articles I have read. Obviously not. The excessive gun laws in my state; city in particular. Are designed to keep lawful citizens from defending themselves. Bet you know which state I am talking about. Even the city.
@xXx_Regulus_xXx2 жыл бұрын
@@jamesedwards3923 wrench attack is just a catchy name. Believe it or not it would be possible for your attacker to be armed and a quicker draw than you. I won't be arguing semantics or investing how quick of a shot you claim to be. The point is someone who is better at violence than you might sidestep the password security issue entirely. Do you understand what I'm saying to you?
@jamesedwards39232 жыл бұрын
I know 🤣😄😄
@paul35626 жыл бұрын
My passwords are generally random words, characters, number, uppers and lowers and also misspelled words and major length.... Then i write it down and stick it on my pc screen so I dont forget.
@misterhat58236 жыл бұрын
Encrypted text file here.
@Demki6 жыл бұрын
But then you have to remember the encryption key.
@JoshelinRico6 жыл бұрын
Not if the encryption key is your password.
@simpletongeek6 жыл бұрын
something like one pad vigenere cipher? that's very clever. it's not until you have to convey your secret password to customer service via the phone that it becomes a problem.
@victorgiovannoni6 жыл бұрын
Joshelin recursion
@LMABeste6 жыл бұрын
I hate when my tapir gets corrupted and I didn't make a backup
@bytefu6 жыл бұрын
It gets currupted because it's rw. Maybe it's time to "chmod -w tapir"
@frankschneider61566 жыл бұрын
Does your tapir often receive bribes ?
@topsecret18375 жыл бұрын
Alexander Robohm Who corrupted it? Some guy from Libya?
@philipsmith10416 жыл бұрын
I have stumbled on to this channel a few months ago, and find them quite fascinating. I found maths really challenging at school, but as I get older understand more and find maths is used in EVEN more places and things than I ever considered. Thank you for creating these short shows with great explanations.
@KoreyHite6 жыл бұрын
"I'm just looking at your collection of cubes" "All solved. That's how I roll" Hahaha
@PeteMcDonald5 жыл бұрын
Knew this comment would be here to like, I just had to look for it :D
@simonmultiverse63493 жыл бұрын
I'm going to glue all your dice to the table, just so you _can't_ roll. Mwaaaaaaa ha ha ha ha ha!
@simonmultiverse63492 жыл бұрын
@@PeteMcDonald You stunningly subtle sophisticated psychologist, you!
@QuackersForMath6 жыл бұрын
I made a program back in secondary school, where you type in random numbers, and it tallies them up. It really shows how not random you really are.
@justinnanu43386 жыл бұрын
I think web developers need to be more educated in this. I hate it when I'm forced to come up with all sorts of crazy passwords with this symbol and that case and this number in that position. I mean, popsiclegoldfishigloobulgaria is a far stronger password than g41@9S. Guess which one my bank does and does not accept?
@SergeMatveenko6 жыл бұрын
On the other hand. I've seen a website just on the last week which allowed me to use only letters and number in the password. I cannot say which one is more rediculous out of these two.
@__mk_km__6 жыл бұрын
What if we combine the strengths of those two to have Password: $7N7e@6MwoB/,@* Its much stronger than those both. Although, right now Im on mobile, so it takes some time to switch between symbols and letters. Thats why you can see an altering symbol/letter and uppercase/lowercase pattern. On Desktop this shouldn't be a problem.
@Demki6 жыл бұрын
I've seen a site that only allows 6 to 8 character passwords, and THEY ARE NOT CASE SENSITIVE.
@dreamyrhodes6 жыл бұрын
Mostly because these developers are too lazy do write sophisticated software. But they still need to comply with standard security tests. And these tests will include "are secure passwords enforced" and the devs will say "yeah we check them before accepting". Point done. And then it comes to stuff like you can't use spaces, you can't use ; or ' or " and other characters, that could be used for command injection (no, and santinizing escaping the characters is way too much effort to implement for the lazy devs), you need uppercase, lowercase, numbers... And so people will chose something like "BankName" as passwords, which is among the weakest password you could chose. Or even better: "Your password must be between 8 and 20 characters" - "But mine has 45..." - "meep! computer says no!" I even have seen a service that turncates your password if you wrote more than 12 letters... m(
@chaumas6 жыл бұрын
Pointing the blame at web developers is generally wrongheaded. Your bank's developers didn't decide the password restrictions. Management handed them a set of requirements, and they implemented them. For all you know, the developers did push back, because even if they did, it almost certainly wouldn't have made any difference.
@WebWolf896 жыл бұрын
I'm really diggin' the series. An episode about password managers would be great!
@mastodans6 жыл бұрын
"They may just visit you instead." Ha ha, great capper.
@swimmingshi3 жыл бұрын
I cracked, lol
@appc236 жыл бұрын
I personally dislike Tapir backups, Iguana-based backups are just way more reliable.
@QBelly6 жыл бұрын
I like chalupacabra
@QBelly6 жыл бұрын
Wait... that's not right...
@bruceli90944 жыл бұрын
@@QBelly i like chawawaa
@jaemate216 жыл бұрын
I love that they knew that the Rand was our currency,that got me excited a lil bit.Great video as always.
@philwatts6 жыл бұрын
I can't begin to imagine which random symbol Mike Pound uses.
@jasoncox52634 жыл бұрын
@@abdulwahabjag #obvious
@RyanOByrd3 жыл бұрын
£ or #?
@NoodleCollie3 жыл бұрын
@@jasoncox5263 Not so obvious. A # isn't called a pound in Britain, it's called a hash.
@roofkat3 жыл бұрын
@@abdulwahabjag TIL that Americans call a hash a pound sign... interesting!
@simonmultiverse63493 жыл бұрын
...and for those who deal in slightly illicit substances which you smoke.... perhaps they don't like the hash sign.
@darnell88976 жыл бұрын
I love that after the great talk on the finer details of password security he alludes to the possibility of a wrench attack.
@daft_punker6 жыл бұрын
It's the man, the legend, Dr. Mike Pound!!
@KX366 жыл бұрын
my problem is that at my work i have literally 17 different passwords (i just counted). They all have different requirements of min/max length (lots are 20 chars max), upper/lower case, special characters, numbers etc. and they expire every month or 3 months or never. If i get one wrong 3 times it gets locked out. In one system it took me 2 months to get a new username set up because the password was locked and there was no other way to resolve this and in another system if i lock my password (or don't use it for 3 months) i have to go on a half day course (every time) about basic use of that software in order to get a new password. All this means everyone uses the same short passwords for everything and so security is made worse because of the measures introduced to increase security.
@perimiter3 жыл бұрын
sounds like you need a password manager.
@ironcito11012 жыл бұрын
Some systems have strange and specific requirements, like the first character has to be an uppercase letter and the last character has to be a number, or stuff like that. Why? That requirement is public information, so it makes passwords _less_ secure. And the systems that force you to regularly change your password are very annoying.
@jamesedwards39232 жыл бұрын
@@perimiter I do.
@BillAnt Жыл бұрын
It's best to use an offline password manager with completely random characters of at least 15 characters, and not trying to remember them. Offline is essential since often hashed password files are stolen from cloud servers. Personally I use a simple text file for all my longins, encrypted with a 64 character pseudo-random password by 7Zip AES-256 method. Let's just say, it's pretty darn secure. ;)
@jamesedwards392311 ай бұрын
@@BillAnt 15 to 20 characters is the statistical average for password length. Bad idea for any important password. Where you control the length and complexity limit.
@B3Band6 жыл бұрын
The last video on the subject had lots of comments about KeePass, so I started using it. I absolutely love it. Now every website gets its own password, and I have no idea what they are! The only password I know is the one for KeePass, which is five words that spell another word as an acronym, with a symbol and spaces.
@AgentM1246 жыл бұрын
My passwords requires you to solve riddles and travel all across the globe writing algorithms and finding patterns in scattered around notes, take 16 randomly chosen characters encrypted with a custom encryption scheme appended to a salted hash of my favorite dog race bitwise xored with the name of the cat of the neighbors 20 years ago and 64 digits of pi randomly selected in sequence either forward or backward prepended with 5 words with substitutions from a chinese character set based on the pseudo random number generator built in my nintendo 3ds.
@Computerphile6 жыл бұрын
Bravo :) >Sean
@Hunnter2k36 жыл бұрын
Luckily my trusted sidekick can make you talk, Agent M! Watch out! He's, shall I say, rather bitey!
@santoshpss4 жыл бұрын
Travel across a ball? I don't understand, you cannot stand on a ball!
@ezerikdaswahreleben27154 жыл бұрын
Hey, that’s the same way like I do . 🤔😨
@jasoncox52634 жыл бұрын
@@santoshpss you must be using translation software. He said globe, as in a map that is projected onto a sphere. Not a ball, as in the round thing that children play with.
@GameBoy-ep7de Жыл бұрын
After watching the other password videos you made, I made a new password. When you mentioned that 5-6 words is nation state level of security, I realized that my new password is very secure and I shouldn't need to change it for a long time.
@bonez5656 жыл бұрын
I enjoyed the little addition at the end that unless you are being directly targeted a simple password (4 words in this example) is good enough, and if you are being directly targeted there are more physical methods than brute forcing a password.
@AureliusR2 жыл бұрын
Yup, there's a great comic about this somewhere. If they're going to brute-force your password, they are going to *brute-force* your password, if you get what I'm saying. How many fingers can they break/cut off before you decide maybe the data isn't worth protecting *that* much.
@sankimalu6 жыл бұрын
Mike's videos are always informative. More of him please...
@tiavor6 жыл бұрын
And then some random website enforces a character limit of max 10 symbols, no spaces, a special character, a capital letter and a number
@Jako19876 жыл бұрын
Tiavor Kuroma In those sites you can use password "secretlol" and don't use/put anything valuable to those accounts. Use your spam email etc.
@bytefu6 жыл бұрын
Do you mean the email that I use for getting spam or the one for sending it? Oops...
@ChenfengBao6 жыл бұрын
That's why you should have a tiered password schemes, and Diceware should probably be reserved for the highest level, like a password manager or encrypted hard drive/OS. Lower level passwords can rely on your password manager.
@allouaymane6 жыл бұрын
I love this type of video :3
@the_real_ch36 жыл бұрын
Mike Pound for king of computerphile!
@ScipioWasHere6 жыл бұрын
Brian A he's more princely in my opinion.
@Selektionsfaktor6 жыл бұрын
I suggest Tom Scott as his... queen?
@Furiends6 жыл бұрын
:3
@kewaljutlla81734 жыл бұрын
Sassy The Sasquatch nmm
@hermis20086 жыл бұрын
I learn a lot a watching this channel. Thank you guys, keep up the good work.
@Saturate08066 жыл бұрын
Can you do a video on vulnerabilities on PGP/GPG protocol? It's in the news right now.
@StephenHind6 жыл бұрын
Buy 5 dice next time! Then it's one roll (of 5 dice) for each word!
@Mike_Hogsheart6 жыл бұрын
clearly you have not seen the prices on proper, unstamped casino dice.
@3rg1s6 жыл бұрын
It's a fun way to generate a password so why not do it number by number...
@TheGTP19956 жыл бұрын
Is your hand big enough to hold five dice at once? ;)
@ThePhoenix1076 жыл бұрын
How do you decide which dice to take for which digit? It can be biased. It's more random to roll a single dice 5 times.
@ChenfengBao6 жыл бұрын
The first time I used diceware I didn't have ANY dice, so I flipped about 20 coins together a bunch of times...
@MickeyD20126 жыл бұрын
I had a password so secure, I literally can't remember it unless I have a keyboard in front of me.
@johnk38416 жыл бұрын
I know what you mean. It's just muscle memory for us when we go and type it.
@thejskwared6 жыл бұрын
Same! I once tried logging into my PC remotely from my tablet and couldn't do it, because the keyboard layout is slightly different. My password is a pattern that's muscle memory now - I don't even know what the actual characters are anymore.
@CorrosiveCitrus6 жыл бұрын
Yep! I know that pain, I can't log into anything from my phone x) I don't remember my passwords... I can just type them...
@muizzsiddique6 жыл бұрын
Is it "1234567890-=qwertyuiop[]asdfghjkl;'#zxcvbnm,./" ?
@atavy5 жыл бұрын
@highks Same :/
@bergolho6 жыл бұрын
The videos with Mike Pound are always good and funny. xD
@TruthNerds5 жыл бұрын
I love this content! Speaking of password security, could you make a video on key stretching, i.e. CPU and possibly memory hard password hashing functions. Legacy schemes include MD5Crypt, bcrypt (which were and to some extent still are widely used on UNIX) and PBKDF2, then there are more modern ones like scrypt and Argon2. CPU hard hashing is also built into the SCRAM protocol. Speaking of which, I'd also love to see a video on challenge response authentication. :-D Either way I'll be recommending your videos to my (IT) coworkers since security is important and your videos are really accessible.
@Czeckie6 жыл бұрын
I like the mention of rubber-hose cryptoanalysis at the end
@Diggnuts6 жыл бұрын
You could also choose a synonym for each word after you roled the dice. "True Thoroughbred Accu Principal" in the XKCD case.
@ThecMaster6 жыл бұрын
If you would like that way to make a password more secure you just need to translate of or two of your word I to in other language. Most people understands two languages. For me I can translate all or some of them to Swedish and suddenly I have doubled the word list. 😊
@chaumas6 жыл бұрын
Doubling the word list increases entropy by only one bit per word. It doesn't hurt, but the benefit is negligible.
@ThecMaster6 жыл бұрын
Yeah. But the wordlist dubbles and but you don't know what language I have used. In my case you know but you need to translate that list to every language to brute force it. Just adding swedish dubbles the list. Adding all of Europe languages... that's about 25. And so on. And that's my point. Not that everyone take a Swedish word. Hope you hanging on. My phone got in to this discussion and messing with my text... xD
@GinoTheSinner6 жыл бұрын
Bra plan synd bara att Tapir = Tapir
@idk-bv3iw6 жыл бұрын
Diceware word lists are available in multiple languages (they contain different words) so you could roll the dice one more time to choose your word list.
@B3Band6 жыл бұрын
"Most people understand two languages" Spoken like someone who has never left Sweden.
@skepticmoderate57906 жыл бұрын
"They may just visit you instead." Wow, what a great ending! XD
@korenn93816 жыл бұрын
When you have to create an account on a website that requires a password between 8 and 12 characters long, have at least one lower case letter, upper case letter, number and other character in order to be accepted, this video helps so much! :P
@jamesedwards39233 жыл бұрын
There are so many ways to do it, it is insane. Unfortunately, yes there are so many services. That have not even attempted to update their security. Would not surprise me if sites using such character limits are using MD5.
@alexandercountry6 жыл бұрын
"all solved, that's how I roll" - Dr Mike Pound
@alsmoviebarn6 жыл бұрын
I just came up with an even better method: Take any dictionary. P = page count C = column count per page N = max words per column R1 = Rand[1, P] R2 = Rand[1, C] R3 = Rand[1, N] For each word needed: * Generate random numbers using any trusted source of true or cryptographically secure random data * Go to page R1 * Look in column R2 * Go to word R3 (if there are fewer than R3 words on this column, continue on to the next column or loop around, your choice) Entropy is MUCH higher as there are a lot more words to choose from. (The dictionary I used says "over 70,000 definitions" on the cover.) EDIT: If you can remember 8 words, and use a 70,000 word dictionary, that's a full 128 bits of entropy, but even at 5 words it's 80 bits. You can get 64 bits with only 4 words.
@highvis_supply6 жыл бұрын
One of the easiest yet secure passwords I once had (before yahoo forced me to change it) was a 6 character password when the minimum was 8 characters
@donaldasayers6 жыл бұрын
I use the first letters of the words of the second verse of an obscure poems. Easy to remember or to reconstruct from a hint, if you forget.
@simonmultiverse63493 жыл бұрын
Look up "The Subway Piranhas" by Edwin Morgan. It's a short and slightly startling poem.
@dreammfyre6 жыл бұрын
Hon much more secure would it be you added an extra dice roll(1-6) after each word?
@seraphina9856 жыл бұрын
One other great use for something like this would be if you need a secure password for telephone access to sensitive accounts. The fact that they are words makes would make them very easy to express orally over the telephone while still being secure (provided you don't go blabbing them in earshot and such).
@skylark.kraken6 жыл бұрын
To save people the effort of using wolfram alpha, there are 6^5 words (7'776), 7776P5 is 2.839E19 combinations from that list - which is about as secure as a 10(.85) digit password that contains A-Za-z0-9 (62 different characters).
@keepitprivate38564 жыл бұрын
one way for pw is use someone's phone number>transfer it to a symbol number mix>put it in b/w a word >repeat the same process that give u at lease 16+ pw with upper/lower case character mixed with nonsense but at the same time easy to remember
@BlackHermit6 жыл бұрын
I learned from XKCD that Correct Horse Battery Staple is a really secure password so I use that everywhere.
@SyberPrepper6 жыл бұрын
Seems like setting operating systems, web sites, etc., with a default delay (10 minute, 30 minute, whatever) after 5 password misses on login would solve a lot of password guessing problems. I doubt most people use such settings/tools available to them. Of course there are many places where passwords are used other than operating systems and web sites, but it would be a great start. Thanks for the video. Great topic!
@ChenfengBao6 жыл бұрын
You can only impose retry limits on authentication systems, but not on encryption systems.
@SyberPrepper6 жыл бұрын
Great point.
@overwrite_oversweet6 жыл бұрын
If you own the system, you can key stretch to a silly amount though. Try brute forcing when each iteration of your KDF takes up megabytes of memory.
@ericsbuds6 жыл бұрын
awesome. I have been using your scheme for all my passwords ever since you suggested it. love the explanation.
@chemicallypure4 жыл бұрын
This guy is an absolute BOSS.
@scott24954 жыл бұрын
Such a likeable character Mike Pound
@BigBossBilly6 жыл бұрын
For anyone curious, Let's compare this 5 word password to a more traditional 10 character password pulling from a pool of 74 random characters. 74^10 = 5E18 possibilities. Compared to the example shown in the video, 7776^5 = 3E19. So this method is slightly better than 10 purely random characters (which is very hard to remember)
@teeds886 жыл бұрын
10 purely random characters are not that hard to remember. And they are faster to type. Anyway, I don't get why people aren't using password managers and still try to remember all their passwords. My passwords are all at least 16 random characters (letters, numbers, special) which is way more secure than what is shown in this video. I don't know any of them by heart but then again I don't need to - i copy and paste them directly from my password manager (which makes me immune to keyloggers as well).
@TheSkepticSkwerl6 жыл бұрын
@@teeds88 doesn't make you immune to clipboard sniffers
@jamesedwards39235 жыл бұрын
LOL, that is the point is it not. Diceware or Leetspeak - Taking something easy to remember for you. However for a computer it is insanely complicated. Some people put down leetspeak. I logically disagree. As we all know, the longer and more complicated your password. The harder it is for a 'computer' to figure it out. Also, if a person can not figure out. If a human and a computer can not figure out what you did. That makes it all the better as a password.
@TheSkepticSkwerl5 жыл бұрын
@@jamesedwards3923 I build password cracking dictionaries. And leet speak is easy to crack. Actually combining words some with leet speak and some with out. While sharing vowels is best. "!l1kEtHr3epeoPLE" is hard to crack
@mimArmand5 жыл бұрын
It's like having a 5 letter password but from an alphabet of 7776 letters!
@Okabim6 жыл бұрын
3:42 That a Panasonic Lumix DMC-lx100? I have one of those, neat little 4k cameras
@Computerphile6 жыл бұрын
Yeah, it's amazing :) >Sean
@topsecret18375 жыл бұрын
Instead of using words to create passwords, I determined that it would be really hard to crack a password where each letter made a name but each individual character is stepped forwards or backwards on the alphabet (so if you have Johns, it would turn into Knimr as each letter is moved in a specific way forwards or backwards) as well as using underscores instead of spaces (because I’m a geek with an affinity with secrecy) or you could just generate a password with the computer automatically remembering it. Dashlane fills in passwords for you so you don’t have to remember them, so that is how I’d improve on that.
@ivahardy48853 жыл бұрын
But just where can you get sweaters like Dr Mike?
@spacebartoloud5 жыл бұрын
I know this is a bit of an older video, but I have learned a lot watching this series from computerphile, some of my passwords are trash (despite me knowing how important security is) but really some of the sites I log into, I really do not care if someone gets into it, but if I do care about it, I do attempt to make it a more secure password, usually involving an uppercase/special character, and number in it, but aye I am realizing how insecure that is. I have always tried to keep my social media posting to a minium because I never wanted anyone to be able to social engineer my more precious passwords. (Yes I will admit that my most secure passwords belong to my games, and anywhere my private info is stored in one way or another... i.e banking, etc.) - One thing I wonder after watching these, and something I have suggested/thought of in the past is just using shorthand to make a password more secure, and I wonder how secure it would actually be, I know they could still brute force it due to a small number of possible inputs, but at least it wouldn't be a common word used in the dictionary. So for example: My password is not password 54 would be this: Mpwinpw54 ---- It should be fairly easy to remember and should be a bit harder for someone to just outright brute force their way in.
@jamesedwards39234 жыл бұрын
Your mistake was.Posting your ruleset. Now hackers will add it to their attack models.
@frognik796 жыл бұрын
I love how he uses an asterisk as a multiply symbol.
@ThePamimo5 жыл бұрын
At first i thought well this is still terrible but its actually a lot better than it seems at first glance. If you run 80bil (educated) guesses p/s you will on average crack a password every 1 hour. And if i remember correctly you had an 8bil guesses p/s in your last video. So even for much stronger computers this is challenging. Not considering the fact that there are other password types you might want to dedicste processing power to as well. Great job. Really nice video explaining this :)
@wooviee6 жыл бұрын
I love that thumb position ABS shine on your spacebar :)
@Shardic6 жыл бұрын
Absolutely great video. Had an amazing time learning this new concept. Thanks.
@richardtickler85556 жыл бұрын
you could also take a dictionairy and then roll in which sixth your word is. repeat around 7 or 8 times for the oed and you get any word
@evellior2 жыл бұрын
He missed the added complexity of using a random number of words. This take the total combinations from 7776^5 (all 5 word combinations) all the way up to 7776^5 + 7776^4 + 7776^3 + 7776^2 + 7776 (all 5 word option + all 4 word option + ... + 1 word options). That's the point of the words being so varied in length.
@ondrejkarbas72875 жыл бұрын
Don't know whether I'm watching because of the content or Mike anymore...
@eloujtimereaver45046 жыл бұрын
I feel like often increasing the difficulty of breaking passwords is proportional to the ease of use of the password. A complete sentence, or several is much easier to type and remember, and much harder to crack than a few random words. It could be social engineered, but if we are being honest any password you can remember can be social engineered. Additionally this entire comment is my password. Too bad so many places only allow around 10 characters, they are insecure by design.
@theMifyoo6 жыл бұрын
A niffy method when you have a password with no length maximum is to set your password as an excerpt from a ebook. Then copy and paste the password when you need to use it. That way you can have a password that is a paragraph or even a page long. Of course you can put a symbol in the middle of a key word and that would make it more difficult.
@ed_halley3 жыл бұрын
A variation of this theme is used in BIP39, a bitcoin/blockchain standard, where everyone uses a published list of 2048 words with some special characteristics. Since it's a smaller list, you choose more of them to be a passphrase, sometimes 12 or 18 or 24 of them, to avoid brute forcing. Its purpose is a sort of passphrase which (1) gets used exceedingly rarely, and (2) should be statistically guaranteed to be globally unique for all time like a GUID.
@sk8rdman6 жыл бұрын
When I decided to update my important passwords, I used a method very similar to this. I just found an online dictionary of English words and uploaded them into a spreadsheet, then wrote a small bit of code that would select 5 random words from that list of 10s of thousands and concatenate them together. This ensures the words I chose were random. However, they weren't totally random, because I did this several different times until I got a password that I found easy enough to remember.
@jamesedwards39234 жыл бұрын
I assume what you mean buy "important passwords" means stuff you have to remember. Most people make the mistake of keeping all their passwords in their heads.
@sk8rdman4 жыл бұрын
@@jamesedwards3923 Important passwords, like for email or a password manager. The sort of thing you need to remember, but also that could be devastating if someone nefarious got access to it. There are some less important passwords I really don't care too much about, because they're for inconsequential websites or something that nobody else could really benefit from hacking into. Everything else can be a string of 16+ random characters, and memorized by a password manager. That keeps everything pretty secure.
@jamesedwards39233 жыл бұрын
@@sk8rdman At least you had the common sense to do it. So many I meet and talk to. Do not care until they get hacked. Or spoofed. You would be surprised how lazy people are with cyber security. How could you 'understand' the situation? Yet not take basic efforts to deal with it?
@MrTheboffin6 жыл бұрын
the way is was tought to choose passwords is pick a obscure phrase you really like, so something you will remember, take the first charactere of each word (i sometimes add the last ones as well if the phrase is to short) swap out a few charecteres for capital numbers or special charecter.
@neumdeneuer18906 жыл бұрын
I have one interesting question regarding this video. When users apply this scheme they sometimes will be "cherry picking" the "random" words. For example, if I don’t like one word, i could roll that word or the whole phrase out again. In my opinion that could become dangerous because it lowers the security by making words pseudorandom again. An attacker could try to find out the most liked words and do some kind of dictionary attack with the statistically most liked words. My argument is that many users would prefer "sunny car day love" over "wrong cold roach stink" and roll again in the second case. What is your opinion regarding my apprehensions?
@fyermind6 жыл бұрын
you aren't wrong. I've been using diceware passwords for about 6 years and noticed that I am more likely to rotate passwords that are hard to type after 3 months than I am for passwords that are easy to type which I will sometimes keep as long as 6 months. I think that you could probably build a probabilistic distribution of diceware passphrases that is a slight improvement on the advertised value against users who misuse the list. However, it is unlikely that will strongly affect any users who use the list correctly.
@neumdeneuer18906 жыл бұрын
@Brendan Hart-Nutter First thanks for your reply. Yes if you use the list right that doesn't matter. The point is that I believe many maybe even most user don't use it correctly and non of the systems addresses this topic by saying don't roll multiple times.
@ChenfengBao6 жыл бұрын
neumde neuer The Diceware website actually addressed this problem, emphasizing that you should accept every word generated in order.
@neumdeneuer18906 жыл бұрын
Chenfeng Bao thanks for your input
@aldimore6 жыл бұрын
You can use a dice with a dictionary. 3 rolls for page, and word number then choose the closest 4 or 5 letter word. Certainly seems more random than that list, but still a nice scheme until next year when computers are 10 times faster. :)
@GreyHulk21566 жыл бұрын
Damn my KZbin password is 'tapirbackuprandrwlibya'! Now I have to change it. What are the chances?!
@palestinevideos20255 жыл бұрын
7776(5)
@PSL19696 жыл бұрын
actually those square casino dice, are only for casino games such as craps. you need the rounded corners dice for regular dice throwing to get more randomness. You can get dice with rounded corners that are also completely unbiased to any side.
@AgeingBoyPsychic5 жыл бұрын
what about choosing 4 words, each containing a random symbol, but each word is in a randomly chosen language... anyone can learn one word of 4 languages so it would be easy to remember. That seems pretty solid compared to limiting yourself to just one language.
@jamesedwards39234 жыл бұрын
That is something you would have to commit. In A great deal of the world. Learning another language is a requirement. You can social engineer that. Via country, age, and education level. However you are not wrong.
@remicaron31916 жыл бұрын
No extra bit. I live for the extra bit. I'd also love a book shelf pass for all the guess you have. It's where I find new books the read. lol
@twodollars4u6 жыл бұрын
i use diceware for every account that doesn't have 2 factor authentication available. I have about 4 i use daily, all six words, and it's surprisingly easy to remember and distinguish them.
@botdamian56883 жыл бұрын
His books: Anderson - Security Engineering Second Edition Ferguson Schneier Kohno - Cryptography Engineering Erickson - Hacking The Art of Exploitation Yoshua Bengio and Aaron - Deep Learning
@DusteDdekay6 жыл бұрын
I built an encrypted hardware password manager that just acts as a usb-serial and a keyboard, you tell it which account you want it to type, then you press a button and it types the login credentials.. It's also opensource and anyone can build it.
@alexrawson84925 жыл бұрын
I think I've seen the video for that...
@grivar6 жыл бұрын
How was the 12.9 calculated?
@PampersRockaer6 жыл бұрын
How many bits you need to store the number 7776, which is log2(7776).
@grivar6 жыл бұрын
Pampersrocker cool, thanks!
@Devieus6 жыл бұрын
Instead of words, you could try using emoji. It won't work all the time, but the dictionary is pretty large too and way easier to remember, probably easy enough to make a whole story worth of emoji.
@Alex-fu9rp6 жыл бұрын
"All solved that's how I roll" was better than Mike's "it does" Bob and Alice analogy from E2EE video
@olli18864 жыл бұрын
7:26 "[spaces] add nothing because they know what spaces are" You have to add spaces to get exact the calculated security, otherwise two different dice throws could yield the same password, e.g. "player rand" would equal "play errand"
@jamesedwards39234 жыл бұрын
Correct.
@ChrisLee-yr7tz3 жыл бұрын
He pretty much explained it at 8:40
@Rudxain2 жыл бұрын
If I ever make a social network or a website with accounts, it would support ALL Unicode characters (even control chars), to give people the freedom to use a password in their native language, or a gibberish one. The only requirement is that it must be longer than 3 codepoints, this is because some codepoints need more than 1 byte to be encoded. Of course, I would add a non-intrusive dialogue suggesting how to choose a password or passphrase depending on the user's needs
@dudeh97026 жыл бұрын
Great video. I have a question on how entropy was calculated. Where did the 12.9 bits come from?
@AdroitConceptions6 жыл бұрын
2^12.9 = 7643.40626667 which is approx the 7776 word choices in the list
@JadeNeoma9 ай бұрын
If you are security conscious enough to use diceware then realistically you should just use a password manager and have the passwords be entirely random. Of course you still have to pick a master password but honestly again just generate a random string of like 25 characters and save it in the password manager and write it down somewhere physical and very well hidden.
@Darth_Pro_x4 жыл бұрын
you can start with four/five words, then when you're sure you remember them change the password to contain another word, and just keep on like that until you're satisfied with the strength
@DigitalImpostor6 жыл бұрын
One simple way to defeat the average dictionary attack is to use an accented character where there is none, an incorrectly accented character or one without an accent where there should be, e.g. venêrable.
@kjetilg95356 жыл бұрын
Here is my recipe for secure and (almost) hassle-free password management: 1. Download Diceware PDF (preferably in your native language) 2. Use random.org to generate numbers between 1-6 3. Generate a 5 - 6 word password 4. Write down your password on a piece of paper and store it somewhere safe. 5. Use a password manager (LastPass, 1Password, F-Secure KEY, Dashlane, etc) and use your Diceware password as master password 6. Enable two-factor auth in your password manager 7. Enable two-factor auth on all sites that offer it (like Google, Facebook, Twitter, etc)
@PleasestopcallingmeDoctorImath6 жыл бұрын
I use 2 randomlygenerated strings concatenated together. Its badically an md5 hash
@RobinHilton223676 жыл бұрын
Would love to see a follow up to this where he uses his Dictionary Searcher (on the GPUs) to show how long this example password would take to locate in the 7776^5 search space.
@ChenfengBao6 жыл бұрын
Robin Hilton Really long. So long that he probably don't have the resource to actually locate this at all.
@overwrite_oversweet6 жыл бұрын
With a fast hash, like SHA 256, and dedicated equipment, a 60 bit password can be cracked in one or two weeks. Obviously, that's an example of how *not* to do things. On the other hand, assuming proper storage on a server with many users, the hash should complete one iteration on the millisecond scale, in which case the password will be cracked in around 40 million years, less on dedicated cracking hardware. Same on home hardware, for which you can key stretch up to a few seconds, but is also much weaker than dedicated cracking hardware.
@itsmealec3 жыл бұрын
what's the reason behind maximum password lengths? is it just for space/storage or is it related to hashing?
@crbielert5 жыл бұрын
That's an interesting idea. I generally just look at all the labels on anything on my desk and use the first letter from each label until I think it's decently long scramble a number in with it that is familiar to me but doesn't have anything to do with me jumble in a couple symbols and upper case and call it a day. Then I clean off my desk. Edit: Maybe I'll continue to do that and bookend the one I generate in that way with a couple random words from the OED selected this way.
@AutodidacticPhd6 жыл бұрын
Seems like you could do the same thing with just a coin and a regular dictionary. Heads=first half of the dictionary, Tails=second half of that, etc down to one page, then one side, then top or bottom, until you have one entry.
@wesful14 жыл бұрын
Out of curiosity, if the attacker knew you were using Diceware, and also knew how long your password was (maybe they heard you type it once?), how does that change the probability of breaking it? It seems like even with 7776 words, there are going to be limited ways to generate a string of X characters.
@leogama3422 Жыл бұрын
Even if the attacker knows the word list, how many words you use and even the separator character, it won't change anything. The number of combinations is finite, but is huge! It's ~ 20 billion billion possibilities for 6 words.
@0lifinz6 жыл бұрын
Can you please do a video about Password-Managers and their security?
@donaldhobson88736 жыл бұрын
If the attacker is spying on you enough to know what words you saw on the side of a bus, wouldn't they see you typing the password?
@TheKyshu6 жыл бұрын
I think the idea is that most easy words people think of are also easy for an attacker to find out, like your kids' names, your birthday, your maiden name, your first school, the kind of stuff that's often used for "security questions".
@chaumas6 жыл бұрын
I think this video didn't do the best job explaining why "choosing random words from your head" is a bad strategy. It's not so much that someone could be spying on you, but rather that the words that are most at hand when you try to think of a "random" word come from a more limited "dictionary" than you would probably think. Humans don't have random number generators in our brains. What we have instead is a fantastic ability to recall concepts that we associate with other concepts. So if you ask someone to name a "random word" out of their head, what they will tend to do is play word association with the word "random". So they'll say "potato" or "haberdashery", because those are the words that come to mind when they think of randomness. If they know to avoid this bias, they'll try to search around for some other word in their vocabulary, but they have _no_ control over the distribution, and no effective way to "break out" of the set of words that happen to be mentally close at hand at the time. So it's not that someone can figure out your "dictionary" by watching you. It's that someone could study the passwords that people tend to mentally generate, and build up an effective process for limiting their search space. And because you didn't use a truly random password, you have no idea how susceptible your password would be to that process.
@seraphina9856 жыл бұрын
+chaumas Human memory is also subject to the availability and recency effects that bias human recall especially when asked to select a random item from some class, the availability effect biases them towards members of that class they remember seeing more often and the recency effect biases them towards members of the class they have seen most recently. Of course the word frequency distribution of the users language significantly affects both of these more frequent words are both seen more often and statistically are far more likely to be among the words you have seen or heard most recently too. That can of course be used to prioritise the order in which words from the dictionary are used too just sort them by the word frequency of the language first. This could even be made worse if you have any additional information about the target like level of education or profession, for example the word frequency list will deviate from the average among the general population if you were to use word frequency data from the writings of university educated engineers for example.
@alxreiuuser57176 жыл бұрын
They don't need to spy on you, just identify some patterns generally used by humans. Assume the attacker has a huge database of previously leaked passwords. He can start with the most common words combined with the most common obfuscation strategies and gradually move towards the least common ones. He can try an enormous number of combinations and surely will crack a lot of passwords this way which depended on some human bias. The farther you gone from common patterns the more chance you can get away with it, but you cant be sure. Or you can use some simple methods which does not introduce such bias and can create passwords with high entropy such as diceware. It is very straightforward, and you can determine the password strength in number of bits. You dont need to outsmart anyone or think too much to generate your passwords, just follow some simple instructions. You can do it even if you are tired, have hangover etc. yet your passwords will be as safe as ever because the process gets entropy outside your brain, like from dice rolls. It is somewhat scaleable, because you can add more words for higher entropy, but it becomes harder to remember and longer to type in. Maybe you can practice with 5-6 words per password and go to 7 if you need very high security, but this is just my understanding of the subject, I am not an expert on the topic.
@jamesedwards39234 жыл бұрын
@@seraphina985 Your stated that perfectly sir.
@hassansyed56616 жыл бұрын
Which password generator app you are using for generating ur password? In some video ou mentioned the name of the application
@TheFkntool6 жыл бұрын
“I’m just looking at your collection of cubes up there” “All solved, that’s how I roll”
@matrinoxtm6 жыл бұрын
Can someone tell me if this is a secure method: Come up with a very complicated password; words or not, it just needs a very high entropy, one greater than say OWASP recommends. This will be your base password. Then add the website domain anywhere you want. You can format it however you want, e.g, using spaces, all caps, snake case, reverse, etc. Then add the month if you need to rotate it monthly. Again you choose the format. It can be numbers or written out, include the year or not, etc. Repeat for every website. It gives you protection against mass password leaks and lets you forgo a password manager, which arguably is a big security risk, especially if it’s sync’d in the cloud. You have unique passwords for every site but you can remember every one of them. It’s weak against individual attacks but they are long enough that they are hard to brute force. I guess one could cross-reference your email from a leak and study it and whatnot. But this is all assuming your that important. You can always use MFA as another layer for accounts you want extra protection on.
@jf35186 жыл бұрын
you can calculate the amount of bits much easier, by taking the amount of dice rolls to the base of 2. log(6^25) / log(2) = 64.624...
@M1America5 жыл бұрын
Dr. Mike Pound should be hired by MI5 and be the new Q!
@zedex12266 жыл бұрын
That last sentance translates as: "My associate here will now begin to hack your password. He is going to hack your kneecap with this tire iron until the password comes out of your mouth."
@jwrm226 жыл бұрын
I would like to know your view on password managers like 1password. Combined with a hardware password or security token.