Inspired by XKCD's classic diceware strip, a programmer named Alice created an open-source algorithm to randomly generate secure passphrases in Welsh. As difficult as it would be for any human or computer to figure out a nonsense phrase like, "correct horse battery staple," it would be even more difficult to guess, "stwffwl batri ceffyl cywir," especially when there are only about 700,000 Welsh speakers to begin with.
While I'm no cryptologist, I did run a few of the passwords through HowSecureIsMyPassword.net and My1Login.net and they seemed to work out all right. According to those sites, it would take 11 quattuordecillion years or 1 trillion trillion trillion years for a computer to crack "DrefnasidRhyd-y-meirchSefydlogiad6*." Similarly, "GlaeruchdyrauGymreigeiddiaiBarcdir0**" would take 429 tredecillion years, or 94 billion trillion trillion years, respectively.
However, as Alice the programmer warns: "It's probably not a good idea to actually use this, since the wordlist is freely available along with the algorithm being used."
So it might not stop a really clever hacker from getting into your email. But it will almost certainly stop a mythic Welsh dragon from stealing your identity. Probably. I'm assuming their claws are pretty clumsy on the keyboard.
Welsh Password Generator [WheresAlice.info]
Image via Lewis Ogden/Flickr (altered)
*Google Translate tells me this means, "The ford of the horses was arranged." I don't know that I trust it—Google Translate is famously sloppy with the grammar of some Celtic languages—but it certainly sounds epic.
**Similarly, this became "Parkland was a Welsh occupation" which sounds like something you would hear on the Breton version of InfoWars.
This video was made a group of security researchers based at the Ben-Gurion University of the Negev and the Weizmann Institute of Science in Israel. The Lamphone, as they call it, is intended as an alternative method of eavesdropping on private conversations without having to compromise a device with malware. In their tests, the researchers […]
Journalist’s Resource published this great comic by Josh Neufeld, explaining the basic concepts behind differential privacy, the data collection method used to prevent bad actors from de-anonymizing the information gleaned from the 2020 Census. The original source includes some other great resources on differential privacy, but since the comic itself is made available under a […]
Last spring, a Baltimore underwent a grinding, long-term government shutdown after the city's systems were hijacked by ransomware. This was exacerbated by massive administrative incompetence: the city had not allocated funds for improved security, training or cyberinsurance, despite having had its emergency services network taken over by ransomware the previous hear, and five city CIOs […]
What’s your biggest gripe about power strips? Since most power servers like that are pretty standard these days, your beef probably isn’t about performance or connectivity. No, the biggest rap on trying to use many power strips is the curious engineering decision that often leaves multiple oddly shaped plugs and charging units unable to all […]
Between work, family obligations, and just getting to bed at a decent hour, we all have a lot on our plates these days. So, it’s easy for things like grooming and skincare to never be a high-priority issue. That is until they become a high priority issue. Like when your face constantly breaks out. Or […]
Today’s teachers extol the virtues of hands-on learning, the method of helping students, particularly the youngest children, learn through basic doing. From trial-and-error methods to practice honing their emerging skills, youngsters can soak up a world of learning opportunities when their developing minds are unleashed. While the thought of dropping a smartphone or tablet into […]