Password Strength Checkers Are Useless


Passwords That Kill?

Apr, 20th 2017

When setting up a new online account, we are all confronted with the frustrating exercise of generating a password. Even more frustrating is the "password critic" we often encounter at the point of account creation - the password strength meter.

If you are like most people, your initial attempts are often insulted as "mediocre" or "weak." One could imagine the meter speaking with Donald Trump's voice, deriding your efforts.

What comes next is a boon for hackers everywhere -- "password" becomes "password!" or "Password!" or even "Passw0rd!" Hooray! Weak has suddenly become strong! You pass the test; you get the keys, and are allowed to order socks or pay your bills or access company documents.

This, of course, is a kabuki dance that does little to protect digital assets from the prying eyes of criminals. Turns out, they know how to add exclamation points at the end of passwords, too!

The folks at Insedia have access to a database of approximately 4 billion records. Browsing it is, to say the least, an amazing education. I'll be writing a series of stories about it during the next few months.

Looking at the data, it's pretty easy to see the habits strength meters have pushed on people. One of the first patterns you see looks like this password ‘evolution':

Insedia’s PitchFork runs the word “password” to get over 900K results. After some drilling, 8 results of a “killer” password “Password11!!” shows two possibly linked accounts-also scoring a 99% on the strength meter. Killer passwords kill when used more than once.

Creating bad passwords that satisfy password meters is a perfectly logical, predictable strategy used by consumers who are just trying to do whatever it is they have to do. It's behavioral econ 101. Websites nudge them to make bad Passw0rds!, so they use them.

Password meters don't really measure what we wish they did -- how hard will this password be to hack? Instead, they measure how well the password creator is obeying the meter's rules -- how many special characters are used, or how many upper and lower case letters, that kind of thing.

This is not a new problem. Mark Stockley at Sophos Naked Security blog has written several times about the issue. In 2015, he tested five terrible passwords on a variety of meters -- passwords that were all in a now-famous list of the 10,000 most common passwords, like abc123, iloveyou!, or ncc1701 (the Star Trek Enterprise). Most meters rated them as good to mediocre. He repeated the test last year, with much the same result.

In a piece titled “Why you STILL can’t trust password meters,” he skewers them.

“(A hacker’s) first line of attack is likely to be based on dictionary words and rules that mimic the common tricks we use to di5gu!se th3m,” he wrote. “The trouble is that most password strength meters don’t actually measure password strength at all…The only good way to measure the strength of a password is to try and crack it – a serious and seriously time consuming business that requires specialist software and expensive hardware.”

Of course, it’s easy to be a critic or these password critics, but a better question to ponder is this: Do password meters help or hurt? Surely, if they force people to avoid using simple dictionary words who might otherwise do so, that’s a net positive.

Still, there are better ways. In a refreshingly simple, non-techno-babble piece of advice, security guru Bruce Schneier often suggests that consumers come up with a very, very hard password – with many random characters – and then store it in a piece of paper in their wallet or purse. While “never write down your password” is considered Gospel, it’s incorrect, he argues. Security is all about improving the odds. You’re better off with a real strong password on a piece of paper than a weak one that you can remember easily. People store important documents in their wallets all the time. It’s a pretty well-evolved system.

A related question is: How often should you change your password? Enforced password changes are another reason for the progressions that’s are obvious in the Insedia data – Password1..Password2….Password3…..etc.

I recently asked a set of security pros recently how often they change their passwords, and their answers might surprise you.

“I only change my password if I’m worried a service has been hacked/compromised”

“Depends. For your corporate network account? Several times a year. For an online newspaper that requires registration in order to read it? Never.”

“This is not (an easy question) … because also changing the password too often can become a security risk.”

Making, and keeping, good passwords is hard. If you just don’t have any time to deal with password rules, at least familiarize yourself with the most common, and avoid them. Since so many people don’t even take this most basic step, you’ll actually be quite a bit safer. Much safer than people Mark Burnett wrote about here. Using his set of stolen passwords, he found that:

  • 0.5% of users have the password password;
  • 0.4% have the passwords password or 123456;
  • 0.9% have the passwords password, 123456 or 12345678;
  • 1.6% have a password from the top 10 passwords
  • 4.4% have a password from the top 100 passwords
  • 9.7% have a password from the top 500 passwords
  • 13.2% have a password from the top 1,000 passwords
  • 30% have a password from the top 10,000 passwords

Join Us. We are waiting for you!

Sign Up Today!

We welcome you to our community where you can gather and share information on debts and issues which may have your life unsettled. Together we thrive!

Logo mobile 4b2fda9e088d7249be95ede0cc3adea2de299a346ba55b450264e0c976b239c5

Join our community Today! IT'S FREE

Our Interactive Knowledge Base Has All The Infomation You Need To Settle Your Debt & Settle Your Life™


Join, Resolve & Share!