A PasswordCard is a credit card-sized card you keep in your wallet, which lets you pick very secure passwords for all your websites, without having to remember them! You just keep them with you, and even if your wallet does get stolen, the thief will still not know your actual passwords.
A very cute idea, well implemented.
Your PasswordCard has a unique grid of random letters and digits on it. The rows have different colors, and the columns different symbols. All you do is remember a combination of a symbol and a color, and then read the letters and digits from there. It couldn’t be simpler!
A chain is only as strong as its weakest link. It’s far safer to pick secure passwords and write them down, than it is to remember simple and easy to guess passwords. You already protect your wallet very well, and even if it does get stolen the thief will still not know which of the many thousands of possibilities on the card is your password.
This is a terrible idea. It’s negligibly better than writing down the passwords, because it’s trivially easy to try every password represented on this card. Once someone has the card, your entropy is just two characters, which is the two characters you memorize for the site. In effect, you have a 2 character password.
https://github.com/LordDarkHelmet/PasswordCardWordListGenerator
I see what you’re saying. But it’s just a tool. You can use the card for any mapping pattern you like. This GitHub link has a nice animated image, I’ve tried to include it here in line, that shows different options you could use. Giving you more than just a two character password of entropy
This feels like a weaker version of GRC’s Off The Grid system. https://www.grc.com/offthegrid.htm
It doesn’t require you to remember something different per website. It’s designed so that you can turn any site name (E.g. Amazon) into a secure password which is unique to you. If you really need a completely offline solution, I don’t think it gets too much better than that.
All of these systems are great until you run into “password must be 9-11 characters and contain two symbols from a hidden list of acceptable symbols, which we will not expose to the user but instead only inform you you’ve chosen the wrong symbol”. I can’t see myself relying on a system like this for more than providing a secure password to my digital password manager.
Oh, I thought it was a smart card
Better idea: memorize lyrics to a song, for each website choose a different starting word, use 4 consecutive words as password. You only have to remembered one number per page, you don’t need to print anything and you can have longer passwords.
YouDownNeverGonna
Seems very easy to crack tbh
Spell the words with mistakes + add numbers and symbols with a rule, capitalize with a rule too
But lyrics of a song is an really obvious target to get to a dictionary(if it’s a dictionary attack)
More interesting would be encrypting name of the service, maybe with you login or something
So “gooey” + “lemmy”, let’s say we take three first letters and three last
“goommy”
Create a dictionary in your head only you know:
go out out mom mom yes (for an example I used short words)
Make mistakes that you would:
go oud oud mam mam yess
Add some numbers and symbols, capitalize
gO Oud Oud mAm mAm yEss (o, a, e are capitalized)
You get the point
Or just use a god damned pw manager. As soon as you have to memorize a system corners will be cut. 16 random characters will never be beaten by a mangled string.
Yeah, but most of the password managers are a security risk too
I would actually be happy to see a good airgapped password manager working with qr codes, or NFC, or something like that
Maybe as an app for an old phone, or a raspberry pi zero
Crack how? With 4-5 words you’re going to have a pretty long password so bruteforce is out. Do you mean that if you will have one of my password you will have the rest? That’s because I gave you obvious example as a joke. What if my password is TakePicturesOfYou. What other password are possible? How will you crack them?
Take the lyrics of the top 1000 popular english songs, and do a rolling hash of 5 words at a time. To account for capitalization, you would have to multiplely the dataset a few times but I bet you most passwords created in this manner would be easily cracked using this method.
That’s not easy. I mean it’s not that hard computationally but you’re talking about very specific attack requiring some dedicated tools. Real life you would have two scenarios:
- You trying to break into my specific account like gmail. This will not help you because they will rate limit you, use captcha and eventually just block you.
- You have a leaked list of thousands/millions password hashes and my password is among them. Hackers would just use existing rainbow tables. They will not think ‘hey, maybe some of those passwords use song lyrics, let’s check’.
This would be bad pretty much only in the very specific scenario of hackers trying to hack my specific account and having leaked hashes of password for this account.
Still I wouldn’t really use this method. I’m just saying it’s better method than some printed card generating short alphanumeric password.