Why password meters lie (and re-used ‘strong’ passwords are a security killer)

When setting up a new online account, we are all confronted with the frustrating exercise of generating a password. Even more frustrating is the “password critic” we often encounter at the point of account creation – the password strength meter.

(This story originally ran at Insedia.com. Read it there.)

If you are like most people, your initial attempts are often insulted as “mediocre” or “weak.” One could imagine the meter speaking with Donald Trump’s voice, deriding your efforts.

What comes next is a boon for hackers everywhere — “password” becomes “password!” or “Password!” or even “Passw0rd!” Hooray! Weak has suddenly become strong! You pass the test; you get the keys, and are allowed to order socks or pay your bills or access company documents.

This, of course, is a kabuki dance that does little to protect digital assets from the prying eyes of criminals. Turns out, they know how to add exclamation points at the end of passwords, too!

The folks at Insedia have access to a database of approximately 4 billion records. Browsing it is, to say the least, an amazing education. I’ll be writing a series of stories about it during the next few months.

Looking at the data, it’s pretty easy to see the habits strength meters have pushed on people. One of the first patterns you see looks like this password ‘evolution’

The password ‘progression.’


Creating bad passwords that satisfy password meters is a perfectly logical, predictable strategy used by consumers who are just trying to do whatever it is they have to do. It’s behavioral econ 101. Websites nudge them to make bad Passw0rds!, so they use them.

Password meters don’t really measure what we wish they did — how hard will this password be to hack? Instead, they measure how well the password creator is obeying the meter’s rules — how many special characters are used, or how many upper and lower case letters, that kind of thing.

This is not a new problem. Mark Stockley at Sophos Naked Security blog has written several times about the issue. In 2015, he tested five terrible passwords on a variety of meters — passwords that were all in a now-famous list of the 10,000 most common passwords, like abc123, iloveyou!, or ncc1701 (the Star Trek Enterprise). Most meters rated them as good to mediocre. He repeated the test last year, with much the same result.

In a piece titled “Why you STILL can’t trust password meters,” he skewers them.

“(A hacker’s) first line of attack is likely to be based on dictionary words and rules that mimic the common tricks we use to di5gu!se th3m,” he wrote. “The trouble is that most password strength meters don’t actually measure password strength at all…The only good way to measure the strength of a password is to try and crack it – a serious and seriously time consuming business that requires specialist software and expensive hardware.”

Of course, it’s easy to be a critic or these password critics, but a better question to ponder is this: Do password meters help or hurt? Surely, if they force people to avoid using simple dictionary words who might otherwise do so, that’s a net positive.

Still, there are better ways. In a refreshingly simple, non-techno-babble piece of advice, security guru Bruce Schneier often suggests that consumers come up with a very, very hard password – with many random characters – and then store it in a piece of paper in their wallet or purse. While “never write down your password” is considered Gospel, it’s incorrect, he argues. Security is all about improving the odds. You’re better off with a real strong password on a piece of paper than a weak one that you can remember easily. People store important documents in their wallets all the time. It’s a pretty well-evolved system.

A related question is: How often should you change your password? Enforced password changes are another reason for the progressions that’s are obvious in the Insedia data – Password1..Password2….Password3…..etc.


I recently asked a set of security pros recently how often they change their passwords, and their answers might surprise you.

“I only change my password if I’m worried a service has been hacked/compromised”

“Depends. For your corporate network account? Several times a year. For an online newspaper that requires registration in order to read it? Never.”

“This is not (an easy question) … because also changing the password too often can become a security risk.”

Making, and keeping, good passwords is hard. If you just don’t have any time to deal with password rules, at least familiarize yourself with the most common, and avoid them. Since so many people don’t even take this most basic step, you’ll actually be quite a bit safer. Much safer than people Mark Burnett wrote about here. Using his set of stolen passwords, he found that:

  • 0.5% of users have the password password;
  • 0.4% have the passwords password or 123456;
  • 0.9% have the passwords password, 123456 or 12345678;
  • 1.6% have a password from the top 10 passwords
  • 4.4% have a password from the top 100 passwords
  • 9.7% have a password from the top 500 passwords
  • 13.2% have a password from the top 1,000 passwords
  • 30% have a password from the top 10,000 passwords


Follow this story: AlertMe

If you’ve read this far, perhaps you’d like to support what I do. That’s easy. Buy something from my NEW LIBRARY AND E-COMMERCE PAGE, Sign up for my free email list, click on an advertisement, or just share the story.

About Bob Sullivan 1332 Articles
BOB SULLIVAN is a veteran journalist and the author of four books, including the 2008 New York Times Best-Seller, Gotcha Capitalism, and the 2010 New York Times Best Seller, Stop Getting Ripped Off! His latest, The Plateau Effect, was published in 2013, and as a paperback, called Getting Unstuck in 2014. He has won the Society of Professional Journalists prestigious Public Service award, a Peabody award, and The Consumer Federation of America Betty Furness award, and been given Consumer Action’s Consumer Excellence Award.


  1. I was thinking about getting one of those password managers,like Fastpass,Onepass,etc,but an expert I heard on a radio show,said she doesn’t like the idea of having one master password,that if hacked would allow someone to access all your passwords.I just use my Chrome browser to remember login names and passwords.Supposedly it uses some method of keeping it safe.Hope so.

  2. jrj90620 I use KeePass to manage my passwords. (Not promoting KeePass….Use whatever password tool you like) I don’t even know what my passwords are for websites. I log in to the tool and copy my user names and passwords as needed.

    The trick to a password tool is to use a strong passphrase. You are correct. You do not want someone cracking the password to one file to get the keys to the kingdom. BUT if you make that password a passphrase it makes it close to impossible to crack. A 33 letter passphrase (ie thetrafficonthe40wasterribletoday ) is 1000 times more secure than a 12 letter password T#sk*#$h2sA)

    Just my 2 cents

    • Additionally, I think that saving passwords in your browser is waaaay less secure than using a pass tool. More than likely someone coming in to your system is going to start with a browser, java or flash vulnerability

  3. Google “xkcd password” for one take on the issue. I’ve been involved in computers since the ’60s, and have been teaching college-level statistics for over a decade.
    I recommend:
    1 use a password manager. I use roboform, which does a bit more, including generating un-crackable passwords
    2 use an xkcd-style passpharase. But do generate a truly random one. There are websites around that will generate these. From a 4,000 common word dictionary, four random numbers will give you a truly random 48-bit strong passphrase. I sacrifice two or three bits by generating 4-8 “trial” passphrases, and pick one for which I can generate a story to remember it. Humans remember stories better than almost anything else, and a good story can make it easy to remember your passphrase.
    3 ditch the digits, special characters, and capitalization nonsense. Just string together those four random words so you can touch type them easily.
    but the key is this: true random selection from the dictionary. “thetrafficonthe40wasterribletoday” is not a random passphrase. But it is astounding how easy it is to come up with a story to string together four random words.

Leave a Reply

Your email address will not be published.


This site uses Akismet to reduce spam. Learn how your comment data is processed.