We’ve all heard it: Passwords should be long, complex, and unique. Long passwords exponentially increase the time it takes for attackers to crack them. Complex passwords—those using a mix of uppercase, lowercase, numbers, and symbols—make brute-force attacks even harder. Uniqueness ensures that if one site gets hacked, your credentials won’t work elsewhere.
But let’s face it: remembering dozens (or hundreds) of long, complex, unique passwords is impossible. Worse yet, you need to change these passwords periodically, making it even more difficult to manage all this.
What should you do?
The solution is a password manager.
A password manager is a tool that stores all your passwords in an encrypted vault. You only need to remember one strong master password to access the rest. It’s a game changer, simplifying your digital life while maintaining security.
However, there’s a valid concern: What happens if the password manager itself gets hacked? Security research—including our own—has shown that password managers can be compromised. If attackers pop the vault, they could gain access to the treasure trove of passwords saved in there.
Thankfully, there’s a way to use password managers that mitigates this risk: a technique that I refer to as The Manfred Modifier, named after the famed game hacker Manfred[1] who personally taught me this technique. (I don’t know if Manfred invented this technique, but he’s a badass, and that name sounds cool, so I’m going to run with it).
To illustrate, visualize a pen with a removable cap. The password manager stores the pen (most of the password), but the cap (a small, memorable addition) is something only you know. The complete password requires both pen and cap, but you only store the pen (without the cap) in the password manager. If the password manager gets hacked, all the attacker gets is the pen – but without the cap, the stored password is useless to hackers.
If the password manager gets popped, all the attacker gets is an incomplete subset of the password. They can’t use it to log into your accounts.
Let me restate that because it’s important and awesome: even if the password manager gets hacked, the attacker doesn’t get your passwords.
It takes a little bit of habit change to implement this method, but once you do, it’s easy and effective. Here’s how to set it up and use it.
Quick Glossary:
When signing up for a new account:
That might sound a tad confusing, so let’s visualize it:
When logging in:
To summarize what this method gets you and why it matters: the stored passwords in your password manager are incomplete – if it gets hacked, the attackers don’t get any complete passwords. They cannot log into your accounts stored in there.
Password managers enable you to use better passwords, while also making it easier for you in the process. Win-win.
To summarize, you should use:
Remember: no system is “unhackable” and even this method doesn’t guarantee 100% security. Theoretically, someone could pop a password manager, somehow deduce that you’re using this modifier technique, somehow crack your memorized modifier, and then access your credentials. But that’s a remarkably high barrier, and one you can be comfortable accepting. By adopting this method, you put yourself considerably ahead of the standard user, and because the standard user is going to be an easier target, attackers are more likely to ignore you and focus on them.
This method may seem hard at first, simply because it requires habit change; you need to create passwords differently, use a tool you may not be used to, and alter the way you login. I’ll be the first to admit that it’s a lot of change to ask. However, each of these is easy. Better yet, once you implement this change, your life will be easier and more secure:
Take a few minutes today to implement this simple approach. It’s an easy way to safeguard your digital life while also delivering massive convenience.
~~
Ted Harrington is the #1 bestselling author of Hackable, the Executive Partner at ISE, and co-founder of both Start VRM and IoT Village. Learn more at https://ise.io
[1] https://www.kaspersky.com/blog/secure-futures-magazine/video-series/notorious-game-hacker-manfred/46197/