Skip to content

The Natasha Method


The Natasha Method

I can’t find anything exacly the same as this password strategy anywhere, so I’m assuming it is unique or an adaptation of another system.

 It was written by a very 20 year old dear friend Natasha Brown, who sadly is no longer alive to lament my own weak passwording system. This is her very good password strategy and published postumously in her memory.

This is the password system I’ve been using for the last 2 years. I’m always surprised by the awful

passwords I see: my neighbours WiFi used to be 123456789, and my dads work email password spent some time as saab (The

car he used to drive) This system is based around codes, and I’ve found it so simple to have good passwords with it.


There are 3 cyphers… they are:



Low secure easy cyphers, used for


Forum Accounts

Alternate email accounts

Wifi Router



Good cyphers for more important things, such as:

Main Email

University systems


Private forum accounts

Computer logon passwords

Bios Passwords



The best cyphers, used for the most secure tasks

Online Banking

Student Finance

Drive Encryption


The cyphers are applied as follows…



Keyboard Co-ordinates, with the first and last characters as caps, and using 3117 speak used when possible…If the password is shorter than 10 characters, then the uncyphered word is typed backwards until 10 is reached

For example


theescapist becomes T5h33335cap0185t%

facebook becomes Fac33b09cK



Pressing the buttons either side of the key (Left first, then right) followed by the followed by the co-ordinate of the

original character. First and last characters are always pressed with the “shift” button depressed.

If the password is shorter than 10 characters, then every other letter from the uncyphered word is typed backwards

until 10 is reached

For Example:


JoeBloggs becomes Hk9-24VNk;9-fhfh4^

NatashaBrown becomes Bm35ry3546gj1dVn9-qebM

Flickr becomes Dgk;uo8xvjlet$

Hotmail becomes Gj9-ryn,35k:



Similar to medium except that the direction keystroke direction is reversed going right to Left.

1337 speak is used when ever it can be, as are keyboard coordinates (1337 is typed first if both are available), however the co-ordinate of the original character is not depressed after the side

keys. The first and last characters are always typed with “shift” pressed, and in the event that the password is shorter

than 15 characters, then the word is typed again, this time using the weak cypher, until 15 is reached.

For Example:


Abbey becomes 5VNVNW2R4T5U7Abb33y6

Bitlocker becomes: Vnu709r4y6k;18p0xvjlw2r433t5



As you can see this system enables you to only need to remember simple keywords (And these could be written down, or kept in

a file) and 3 cyphers (Don’t write these down) you get long passwords with a good mix of upper and lower case, symbols, and

numbers. By using a 3 tier system you have protection in the event that someone is smart enough to figure out one of your

codes, and you don’t have overly strong passwords for pointless stuff.


I hope this can help some people, as I know making good passwords can be a tricky thing (Constant balancing between security and memory!) and I’ve found this system to be really useful. Also, if it’s rubbish and there’s some glaring flaw that I’ve missed, please tell me so that I can stop using it and come up with a better way!


Finally, don’t try to get in to my accounts with any of this! The codes I put up here are very different to the ones I am using, and my keywords are a bit more obscure than the ones here!















From → Uncategorized

Comments are closed.

%d bloggers like this: