Chaps,
Some of you are using methods that aren't secure. It's important not to underestimate the methods used by an expert to break them, or even a script kiddie. The tricks people use to make and remember passwords and pin numbers are well-known and most of them are poor security. Might seem tough by human standards, but they're paper thin in the face of a computer attack. Even a small computer can search for a password permutation in a file containing several million possibilities in well under a second, crack anagrams in microseconds, and apply substitutions in a flash. The pre-defined comparison file can contain words copied from the dictionaries of many different languages, plus lists of well-known choices, c0mm0n numerations, and other known obfuscations.
The single most important feature of a security key is that it be an unpredictable combination. Don't use anything based on a meaningful string of characters, or a meaningful string that's been encrypted with pen and pencil methods.
We are so bad at making up passwords that many organisations won't let us. Instead users are periodically told to pick one from a freshly generated and unique list of randomised character, number and punctuation strings at least 9 characters in length. The disadvantage of this system is people write down hard to remember passwords. They even write down passwords after being told it's a sacking offence…
Zebethyal recommended a good way of generating long semi-randomised passwords from a memorable phrase. I often use characters selected from book titles, author names, publisher and edition numbers spiced up with punctuation. Much to be said in favour of 'Nitt4agm2c2taotp' but – for obvious reasons – avoid obvious pass phrases.
Does strong security matter? Lots of people hide front-door keys under a flower pot and never get burgled. I prefer not to take unnecessary risks on the internet; anyone can come calling…
Dave
Edited By SillyOldDuffer on 06/07/2018 20:33:00