Feeds

Use the holy word of God to stay secure online, says bishop

What he opens no one can shut, what he shuts no one can open

Internet Security Threat Report 2014

A bishop in Blighty has suggested that passages from the Bible can be used to create memorable but hard to crack passwords.

The Right Reverend James Langstaff urged his congregation to stop using pets' name or stock phrases for login credentials in favour of passwords derived from passages in the New Testament.

"The Bible offers a life-long source of new passwords, that can include both upper and lower case letters and numbers to help create memorable, secure passwords," the Bishop of Rochester explained, adding that holy passwords would help believers to recall passages from the Good Book.

The bishop suggests users derive their passwords by selecting their favourite passages, taking the first letter from each word in the quote, and appending the chapter and verse from which it is derived.

For instance: "Father, into your hands I commit my spirit" from Luke chapter 23 verse 46 would create the password FiyhIcmsL23V46.

Such a password would be far harder to randomly guess than most used today but perhaps not impossible. Passwords derived from Jules' monologue in Pulp Fiction, for example, might be popular.

"If someone knew that you were an active Christian, they might twig that you'll have chosen one of the more famous Bible quotes as the basis of your password," argues Graham Cluley, a security consultant at Sophos. "You can also imagine that if the bishop's password advice became popular, hackers would simply create a database of Bible quotes which they would use to break into your account."

Even better security could be achieved by using a made-up phrase to derive a password, Cluley suggests.

In either case users should still use different passwords on different websites to guard against the possibility that a breach against one site won't open up more sensitive accounts to attack. ®

Bootnote

The word "password" itself does not appear in the Bible, according to a not-exactly-conclusive search, which is perhaps just as well. Like most subjects the whole concept of secrecy can be either championed or lambasted by selective quotations from the bible.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
You dirty RAT! Hong Kong protesters infected by iOS, Android spyware
Did China fling remote access Trojan at Occupy Central?
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.