Password game requires more ridiculous rules as you play

Password rules seem to get more strict and weird over time. Neal Agarwal takes it to a ridiculous level, as Neal Agarwal likes to do. Enter a password that fits the rules, and another rule pops up until you find yourself with a password with a thousand wingdings.

Tags: , ,

Predictable Android lock patterns

Predictable Android lock patterns

Passwords are annoying, which is why so many people use passwords that are less than secure. Maybe the keys are a bit shorter than they should be, match a word in the dictionary, or are repeats across services. In these cluster of passwords, patterns become obvious.

Marte Løge, for her master's thesis at Norwegian University of Science and Technology, wondered if similar rules applied to Android lock screen patterns. Dan Goodin for Ars Technica explains:

Data breaches over the years have repeatedly shown some of the most common passwords are “1234567”, “password”, and “letmein”. Løge said many ALPs suffer a similar form of weakness. More than 10 percent of the ones she collected were fashioned after an alphabetic letter, which often corresponded to the first initial of the subject or of a spouse, child, or other person close to the subject. The discovery is significant, because it means attackers may have a one-in-ten chance of guessing an ALP with no more than about 100 guesses. The number of guesses could be reduced further if the attacker knows the names of the target or of people close to the target.

So wait a minute. What's a lock screen?

Tags: , ,

Network of computer passwords


We all know how painful it is to deal with computer login passwords. Computer administrators keep telling us to have "secure" passwords, and to not reuse them, but of course we ignore this advice. Who can remember all of these passwords anyway? So, we keep them simple, and we reuse them.

The SplashData group, which markets what they call a "secure password and record management solution", provide an annual list of the 25 most common passwords found on the Internet. These are compiled from leaked passwords posted online by hackers. I have looked at the lists for 2011, 2012, 2013 and 2014.

As usual, I have used a phylogenetic network as a form of exploratory data analysis. I first used the steinhaus similarity to calculate the pairwise similarity of the 43 passwords that appear — this similarity ignores what are called "negative matches" (which is important because most of the passwords do not appear in the lists for all four years). This was followed by a Neighbor-net analysis to display the between-word similarities as a phylogenetic network. So, passwords that are closely connected in the network are similar to each other based on their popularity across the four years, and those that are further apart are progressively more different from each other. Those passwords that are in the top 25 for all four years are marked in red.


You will note the similarity among many of these passwords. They are mostly simple combinations of numbers, words, or a row of keys on the standard English keyboard. Obviously, these are not secure passwords.

The numbers one and two passwords for all four years were "password" and "123456", with "12345678" right behind. Oddly, there has been a distinct increase in "1234", "12345" and "123456789" during the years — they are grouped at the bottom right of the network. The passwords grouped at the bottom left have decreased in popularity through time.

Clearly, many people do not take login security very seriously. However, the problem also comes from the fact that system administrators fob the job of security off on the users —there have been many discussions of the lunacy of asking users to use unique "secure" passwords for each and every system (eg. Robert McMillan, of Wired magazine: Do you really need a password you can barely remember?). Indeed, Mat Honan, also writing at Wired magazine, has pointed out that even secure passwords are out of place in the Internet world (Kill the password: why a string of characters can’t protect us anymore). It will be interesting to see what happens next.