Skip to content

The Natasha Method

02/06/2012

The Natasha Method

I can’t find anything exacly the same as this password strategy anywhere, so I’m assuming it is unique or an adaptation of another system.

 It was written by a very 20 year old dear friend Natasha Brown, who sadly is no longer alive to lament my own weak passwording system. This is her very good password strategy and published postumously in her memory.

This is the password system I’ve been using for the last 2 years. I’m always surprised by the awful

passwords I see: my neighbours WiFi used to be 123456789, and my dads work email password spent some time as saab (The

car he used to drive) This system is based around codes, and I’ve found it so simple to have good passwords with it.

 

There are 3 cyphers… they are:

 

Weak

Low secure easy cyphers, used for

Facebook

Forum Accounts

Alternate email accounts

Wifi Router

 

Medium

Good cyphers for more important things, such as:

Main Email

University systems

Flickr

Private forum accounts

Computer logon passwords

Bios Passwords

 

Strong

The best cyphers, used for the most secure tasks

Online Banking

Student Finance

Drive Encryption

 

The cyphers are applied as follows…

 

Weak:

Keyboard Co-ordinates, with the first and last characters as caps, and using 3117 speak used when possible…If the password is shorter than 10 characters, then the uncyphered word is typed backwards until 10 is reached

For example

 

theescapist becomes T5h33335cap0185t%

facebook becomes Fac33b09cK

 

Medium

Pressing the buttons either side of the key (Left first, then right) followed by the followed by the co-ordinate of the

original character. First and last characters are always pressed with the “shift” button depressed.

If the password is shorter than 10 characters, then every other letter from the uncyphered word is typed backwards

until 10 is reached

For Example:

 

JoeBloggs becomes Hk9-24VNk;9-fhfh4^

NatashaBrown becomes Bm35ry3546gj1dVn9-qebM

Flickr becomes Dgk;uo8xvjlet$

Hotmail becomes Gj9-ryn,35k:

 

Strong

Similar to medium except that the direction keystroke direction is reversed going right to Left.

1337 speak is used when ever it can be, as are keyboard coordinates (1337 is typed first if both are available), however the co-ordinate of the original character is not depressed after the side

keys. The first and last characters are always typed with “shift” pressed, and in the event that the password is shorter

than 15 characters, then the word is typed again, this time using the weak cypher, until 15 is reached.

For Example:

 

Abbey becomes 5VNVNW2R4T5U7Abb33y6

Bitlocker becomes: Vnu709r4y6k;18p0xvjlw2r433t5

 

 

As you can see this system enables you to only need to remember simple keywords (And these could be written down, or kept in

a file) and 3 cyphers (Don’t write these down) you get long passwords with a good mix of upper and lower case, symbols, and

numbers. By using a 3 tier system you have protection in the event that someone is smart enough to figure out one of your

codes, and you don’t have overly strong passwords for pointless stuff.

 

I hope this can help some people, as I know making good passwords can be a tricky thing (Constant balancing between security and memory!) and I’ve found this system to be really useful. Also, if it’s rubbish and there’s some glaring flaw that I’ve missed, please tell me so that I can stop using it and come up with a better way!

 

Finally, don’t try to get in to my accounts with any of this! The codes I put up here are very different to the ones I am using, and my keywords are a bit more obscure than the ones here!

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Advertisements

From → Uncategorized

Comments are closed.

%d bloggers like this: