[Discuss] Most common (or Most important) privacy leaks

Richard Pieri richard.pieri at gmail.com
Wed Feb 18 12:30:24 EST 2015


On 2/18/2015 11:20 AM, Bill Bogstad wrote:
> And the same users are going to use "Four score ...." if you require
> longer passwords,
>   so you lose anyway.

I did preface that with "[p]assword reform starts with...".

Key chain managers can be a good next step. They allow the use of 
arbitrary, random gibberish as passwords in a way that users only need 
to remember one good password for unlocking the key chain. In essence 
they can do the same thing that heavy duty encryption systems do: they 
generate large random keys for actual encryption and encrypt these keys 
with user-provided passwords or passphrases. This way you can have 
strong passwords without any password reuse. Link a key chain manager to 
a trustworthy third party and you can have a robust password management 
system that is resistant to attacks.

-- 
Rich P.



More information about the Discuss mailing list