home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   PUBLIC_KEYS      Public-Key Discussion Echo      845 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 839 of 845   
   August Abolins to Wilfred van Velzen   
   self-managed passwords with gpg   
   06 Feb 26 20:13:00   
   
   MSGID: 2:221/1.58@fidonet 292e4e6a   
   REPLY: 2:280/464 6985e986   
   PID: OpenXP/5.0.64 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0500   
   Hello Wilfred!   
      
    AA>> Length can vary, depending on the formula output for each "part".   
    AA>> Pronouncable words are a choice. Pronouncable or not doesn't really   
    AA>> matter if the whole sum of parts makes no "sense".   
      
    WvV> Well it makes your password easier to guess. Password guessers use   
    WvV> dictionaries.   
      
   First of all, a password guesser only comes into play when the hacking system     
   relies on known email addresses that are assumed to be the username part.   
      
   There is no risk of hack if even the username part follows some obfuscation     
   process too.   
      
   I don't know about you, but many of my site/system logins are NOT email     
   addresses.  So, to guess the right username + password pair would be nearly     
   impossible to "guess", and force-feeding millions of combinations of those at     
   the user interface would be impossible.   
      
      
    WvV> [...] But sometimes databases   
    WvV> get stolen. Or hackers get direct access to the systems that store the   
    WvV> (encoded) passwords.   
      
   I think unencryted databases are the true target.   
      
      
    AA>> Parts [A] [B] [C] [D] could be in any order you like.   
      
    WvV> As long as you always use the same order. Otherwise you can forget which   
    WvV> order you used for a particular website. ;-)   
      
   That's right.  Find the "formula" that works for you, and stick with it, and     
   then you can recreate a pw for any site you need.  The whole point is to   
   avoid having to remember a particular pw string - just rebuild it.   
      
      
    WvV> The devil is in the details I suppose. Depending on a few variables in   
    WvV> your sceme, it might be sufficiently random for passwords guessers   
    WvV> (which have become quite advanced, and will only become better in the   
    WvV> future) to not break it.   
      
   Still, the guessers  are useless if they can't throw all their guesses at an     
   account in a few seconds.   
      
      
    WvV> But I think it's much easier and safer, to use long truly randomly   
    WvV> generated passwords and store them in a password manager.   
      
   I dunno.. I find it quite easy (and fun) to rebuild my passwords when I have     
   to.  I might need to use an intermediary computer to access something     
   temporarily, and I won't need to rely on any other devices to provide the pw.   
      
   And length is not as critical as to avoid outright guessable.  I have a     
   friend who simply uses her first name and 1234 for her hotmail account, and     
   her name is in the email address itself!   
      
   Another fellow uses the layout of the keyboard to guide him to "remember" his     
   passswords.  Eg. the leftmost keys on the kb = qweasdzxc, or qazwsxed, and     
   then some numbers.  Personally, I would not use that scheme as the sole pw.      
   Instead, maybe the qweasdzxc or qazwsxedc strings could be one of the parts     
   in [A] [B] [C] as a minimum.   
      
   I do admit, that some of my sites don't follow exactly the same scheme     
   between them. I do something different for financial/banking accounts too.      
   And a few older sites have pws before I came up with the formula method.   
      
   I have stored a few more pws using my gpg method. I luv it.   
      
   I wish I had thought of using my formula method and gpg store idea for my     
   facebook account that I started using over about 15yrs ago.  Last night, I     
   accidentally logged out of facebook and the recovery system is not allowing     
   me to finish authentication unless I "use another device"!  That is     
   impossible, since I've only ever used facebook on only one recent device     
   which is the one I logged out of!   
      
   I did once access facebook on one of my iPods, but the wifi on it stopped     
   working a long time ago.   
      
   For recovery, facebook can send a 6-digit code to an email address that I had     
   associated with facebook.  That works.  But when I enter the 6-digits at the     
   facebook prompt for those digits, it comes up with "you have to use another     
   device that you used before".   That requirement is stupid!   I think this     
   might be the perfect time to drop Facebook.   
      
   --    
     ../|ug   
      
   --- OpenXP 5.0.64   
    * Origin: What do you call an excavated pyramid? Unencrypted. (2:221/1.58)   
   SEEN-BY: 50/22 103/705 105/81 106/201 124/5016 128/187 153/757 7715   
   SEEN-BY: 154/10 30 110 203/0 218/700 221/1 6 226/30 227/114 229/110   
   SEEN-BY: 229/112 134 206 317 400 426 428 470 664 700 705 240/1120   
   SEEN-BY: 240/5832 266/512 280/464 5003 5006 291/111 292/854 8125 301/1   
   SEEN-BY: 310/31 320/219 322/757 341/66 234 342/200 396/45 423/81 120   
   SEEN-BY: 460/58 256 1124 633/280 712/848 770/1 902/26 5020/400 8912   
   SEEN-BY: 5054/30 5075/35   
   PATH: 221/1 280/464 460/58 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca