Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

A recently published survey named the twenty most common passwords used to “secure” personal computing devices, like laptops and phones. Guess what is the most favourite password? Do not look at your keyboard, close your eyes when you try remember the exact layout of your keyboard. What is the first thing comes to mind? 123456. Maybe you type a lot, so maybe you got stuck at qwerty. Ever used those for a password? Not even right at the beginning, when the password thing was such a bother?

Maybe you were clever, like about 20% of us, and you opted for password? I know I have used all three of those, then I was made clever by some other clever dude, and I learned the most bestest of ways for to make better security in the making of passwords. That grammar was awful, I know, but that is lesson number one! Be unpredictable!

The simplest way to make a memorable password, is to spell something you will not forget, in a way that no-one will suspect. Is your name John Smith? Spell it Jawn Smiff. Even better: JawnSpaceSmiff. Most firewalls will give you a good rating on that one, but some demand a mixture of letters and numbers, even symbols or punctuation. How on earth must I remember that?

Let us randomise John’s name better. Look at the letters: John Smith. I look at my Keyboard, and I see no alternative for J, but next, I see a zero, an h and n, space, 5, m, 1, t and h. That spells J0hn 5m1th. The little bar on your virus protector just turned green! Go further: J0h^_5m17h. But this is not good enough yet. Every security expert and hacker will tell you; do not use the same password for everything! So let us up the ante a bit.

For every device and service, make up your own name. Wh4t54p9 for WhatsApp. P1nt3r35t for Pinterest. You like to bake cookies? 1L1k32BakeC00k135 for your recipe app. My(0mp00t3r for my computer. This way, you can even leave yourself reminders, because who will know what to do with a list lying on your table that says:

john smith
I like to bake cookies

Use lots of symbols that require the Shift key, in case someone is trying to look what you type. The more effort it is to type in, the longer it will take to “crack” your password. No password is 100% secure, but with enough effort, and sheer length, you can get close. The only reason Bitcoins are “unhackable”, is because a computer could possibly spend decades trying every combination of symbols available. With emerging “quantum” computer technology, it is expected that hacking a Bitcoin will take hours, maybe minutes. The good news is, it will take years before your neighbourhood hacker gets hold of that technology.

How do you keep a secret? By not sharing it.  Do not use “The Cloud” for anything you do not want to lose or get prosecuted for, like maybe opinions on impossibly suspect vaccines and those who promote them. Researchers have lost years of work on their doctoral thesis, because Google read their work and put it behind a politically correct firewall, where it “got lost” from the “most secure servers on earth”. Recently, doctors and nurses were fired and even lost licences to practise, for innocently tweeting about not worshipping Baal’s Holy Water, I mean Bill Gates’ vaccines.

One last thing: You hear a lot about “hacking” these days. The latest is the “hacking” of voting machines in Yankeeland.  Hacking actually is exactly what it sounds like; a guy standing by the object and hacking at it, blow by blow, until it breaks off or open. A hacker will sit (well, program his computer to sit) and try every address it can guess at, and when it gets a reply, it will start sending passwords, one by one, until one works. Of course, they first go through that list of 1234qwerty lazies we talked about at the beginning. That, however, is not what’s happening at the DNC, or voting machines, or Microsoft operating systems.

What the CIA does is not “hacking” but “exploitation”. They “exploit vulnerabilities” in systems such as Windows™. Baal gates has a spy listening under your Windows™, and now he is infiltrating the only decent alternative, Linux. There is a lot of extraneous information in every single file that you create with Billy’s software.

On a printed page, there are microscopic variations in letter spacing, period placing, line justification and such things we cannot really pick up by eye. Those little discrepancies can be deciphered by properly equipped people. Those indiscernible mistakes on every single printed page identifies your computer, username, creation and print dates and goodness knows what else. That’s how they catch public workers who steal embarrassing proof of corruption that “…threaten National Security, but in the interests of transparent governance, said public servant can be held accountable for those unproven allegations.”

Losing your secrets via the CIA’s spying tools you innocently paid for and installed yourself, is not hacking, it is programmed intelligence gathering. When private hackers find these loopholes, Billy da Patch quickly issues a “safety issue warning”. The closing of said loophole may be near immediate, or sometimes we wait until the client that paid Bill for that functionality, “upgrades” his package and Bill opens him another little hole when he “updates” your software.

The other way you can lose your privacy, is when the machine was designed for surveillance, like your cell phone or “smart watch”. Or, recently, the routers and servers that sit in your telecoms company’s rooms. These are so-called “back doors” built right into the physical machine you are holding in your hand, or the ones connecting you “securely” to the rest of the world.

Remember the spat between America and Huawei? “They are spying on ‘Murica!” Actually, the Yanks are really angry that Huawei does not want to give them access to their routers and servers via this back door, and no amount of reverse engineering could find it. The Chinese told (and showed) them there is no such functionality on their equipment, so America banned their equipment!

The lesson here is; If you want to keep your data secure, do not expose it to the network. Keep your stuff on a removable drive, which you ONLY plug in while not connected to the internet. There are no secrets on the network, not even the one you built yourself using machines They made.

The good news? There are people using these same back doors and vulnerabilities to find us the evidence of our ruling kakastocracy’s underhanded dealings and genocide. One day, soon, when the four unicorns of happiness rides in on the rainbow, we will be able to inspect every single government financial record, in real time, as they are being created. THAT would be democracy!

Let us see how much taxes we really need, when millions of auditors are working for free, searching for financial misconduct, so they can claim that 1% prize money. Another nine percent if you can get us the money back. Around here, we call that Translucency in Government, the basis of Democratic Anarchy. As opposed to Transparent Governance, which actually means making invisible the kleptomania of the kakastocracy.