anger lunar greek worry brown hole

aNger lUnar gReek wOrry bRown hOle

nger lnar grek wrry brwn hle

rngea runal kreeg yorrw nrowb eolh

angel runag rreew korrb wrowh nole

anger lunar greek worry brown hole333442.

anger lunar greek worry brown hole864.

I guess it makes me boring but I try to get people to use stronger passwords.People love to use the same password over and over again, or they invent some amazing scheme like the same single word followed by their birth year, or replacing a's with 4's. And no matter how many password database get hacked the idea that password security matters doesn't seem to really sink in.When I do get someone to listen I tell them to use diceware generated passwords and them write them down in a little book and guard the book jealously (actually, I tell them to use a password manager but most people seem to balk at using software I think for fear of losing their passwords).So I advise them to buy something like this and then keep a record of their passwords generated using diceware . Usually people seem happy to have something that creates them passwords like this:But then they often ask the sensible question: "What if someone steals that book?" And so I suggest a 'two factor' solution. Two factor authentication is often characterized as a combination of something you know (e.g. a secret password) and something you have (for example, a smartphone with an app on it that generates a unique number valid for a few seconds).In my two factor paper passwords scheme these are reversed: the something you have is the password (since it's written down and not something you can remember) and the something you know is how to transform the password into what you actually type in.For example, suppose the password written down is. The second factor might be that the second letter of each word will be capitalized. So the user would type inOr maybe it's that the first vowel in each word is omitted: the user types inOr that the first and last letters of each word are swapped:Or the letters at the end and start of each word are swapped:Or that the password is followed by digits giving the number of consonants in each word:Or that the number of consonants in each word is multiplied together to create a number added at the end:There are all manner of schemes someone can use to make possession of the book useless and it's a good way to get a user who isn't interested in password security engaged in the topic. The goal should be something easy to remember that's reasonably easy to compute in your head.Of course, this doesn't protect against an attack where a single password has leaked and someone has access to the book because they may be able to figure out the scheme used, but this is a huge advance on the poor habits of most users.PS If you are planning to do this... please consider using a password manager first.PPS This will not protect the user against disclosure of an individual password. Two factor systems like Google Authenticator do help there. Always enable two factor authentication if it is available.PPPS If you read this blog post and only take one action... go make sure your email is secured