Snowden’s ‘Sexy Margaret Thatcher’ Password Isn’t So Secure

Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his famously paranoid sense of security.

In a YouTube extra from his interview with John Oliver posted late last week, Snowden offered some password security advice: He pans Olivers comically awful suggestions like passwerd, onetwothreefour, and limpbiscuit4eva, and instead wisely recommends that computer users switch from passwords to much longer passphrases. He goes on to offer an example: MargaretThatcheris110%SEXY.

This was not just an off-the-cuff suggestion in a live interview, but a piece of advice that Snowden had thought about for at least two years. When he first contacted Glenn Greenwald in 2012 under the pseudonym Cincinnatus, Snowden urged Greenwald to start using the encryption software PGP for their communications, and even made him a 12-minute video tutorial. His voice garbled and auto-tuned for anonymity, Cincinnatus offered Greenwald the same example of a strong password he would give to Oliver:MargaretThatcheris110%SEXY. The mention of comes around the six minute mark in the below video.

Heres the thing, though: For a guy so careful about passwords that hes known to pull a blanket over his head when entering them into his laptop, Snowdens ironic Tory-fetishizing password advice is far from ideal.

Considering that hes recommended it for someone like Greenwald, whos going up againstthe NSAs uber-hackers and supercomputers, Snowdens MargaretThatcheris110%SEXY is only a borderline secure password, says Joseph Bonneau, a postdoctoral cryptography researcher at Stanford who has published papers in several academic journals on optimizing password security. Just because somethings a phrase and its longer, people get fixated on that, he says. The length doesnt mean that much to your adversary. The real problem is that people are really bad at producing randomness. Its really hard to tell if what youve picked is hard to guess.

Before elaborating on that randomness problem, Bonneau first notes that its important to think about where a password is being used. If its for an online account like Gmail, the service provider like Google probably limits the number of attempts a hacker can make before locking them out. For that sort of application, Snowdens Thatcher passphrase works fine, Bonneau says. But for offline password cracking, say, on a seized computer, an attacker can try passwords much, much faster. Assume your adversary is capable of one trillion guesses per second, Snowden himself told journalist Laura Poitras in their initial email exchange.

To withstand that sort of ultra-high-speed cracking, a passphrase has to be secure against an algorithm that will exploit virtually any pattern to narrow the scope of possibilities. And anything that makes sense to humanseven the unlikely notion of sexual attraction to Margaret Thatcherfollows plenty of linguistic patterns. In a 2012 study, Bonneau and his fellow researchers checked if phrases had already been signed up for by users of the Amazon service PayPhrase, which required a unique series of multiple words to be chosen bya user for every registration. They found that they could narrow down their guesses at whichphrases were already takenusinglanguage samples and lists of proper names from Wikipedia, IMDB, the language learning website English Language Learning Online, and even the Urban Dictionarys collection of slang idioms.

With those data sets built into their guessing algorithm, they found that Amazon users four-word phrases have only 30 bits of entropyin other words, two to the 30th power possibilities. Bonneau estimatesthat a passphrase needs at least 70 or 80 bits of entropy to be considered secureIn other words, to withstand Snowdens trillion-guesses-a-second standard for years or decades rather than seconds or days.

In another related study published six years earlier, a group of Carnegie Mellon researchers found that when they asked users to come up with mnemonic passwords based on phrasesFour score and seven years ago, our Fathers turns into 4s&7yaoF, for instance65 percent of them used phrases that they could find on Google. Out of 144 subjects in the study, two chose lyrics from the same Oscar Meyer Weiner jingle. None of that bodes well for humans potential to choose a passphrase thats as unique as they think it is.

Tweaking a passphrase with character changes can certainly help. Snowden writes in the notes of his video for Greenwald that intentional, personal, and memorable typos can make passphrases far more secure. He even suggests that spelling sexy as sessy in his Margaret Thatcher example could help. But Snowden also rebuts his own point in his conversation with John Oliver, when he says that permutations of common words could still be included in attackers dictionaries.

See more here:
Snowden’s ‘Sexy Margaret Thatcher’ Password Isn’t So Secure

Related Posts
This entry was posted in $1$s. Bookmark the permalink.