15 thoughts on “Dan Kaminsky’s Cryptomnemonics

  1. This is just one part of Dan’s talk. I’m sure he gave away the last one later. (Fabienne gave me hers :-) This video also doesn’t have Dan drinking a mixture of Mickey’s and Cinnamon Toast Crunch which was his self-inflicted punishment for tunneling DNS over DNS.

  2. Pretty brilliant reasoning. I think this guy is on to something, I just hope that he is not all theory and not code, otherwise all it is(and-ever-will-be is) a really nice idea. I hope he takes it from concept to prototype. I only wish I lived closer to Nevada so I could have gone.

    As with Figgy, I too was wondering where one can find info of where this type of Hacker conventions are taking place as google usually reveals some convention that happend back in the 90s. Any tips, or links would seriously be appreciated, specially for the south region(Tx, Al, Ms, LA, MX, NM). Thanx.

    And Crash – While the speaches them selfs are not “Technically” a hack or talking about one, It does fit into the relm of out of the norm technology rearrangement, thus giving it a hack status. Just my opinion. ..X..

  3. I totally agree with him, though I think there could have been better name selection criteria. In particular, we remember people we know much better than those we don’t, so a list of famous people or characters is probably a better source than the census. John and James and Jim and Jason and Joe and Joseph and Jack are to my mind more disparate than uncommon names like Dezzutti and Doornbos.

    “Sting and Mary Einstein”
    “Dante and Cher Bush”
    “Pinocchio and Marge Hitler”
    …and so on.

    Though I think very few women are known for their first names… I may be wrong.

  4. Actually, there are three directions to go in in terms of name selection:

    1) Generic — hard, because there’s not enough generic names to go around
    2) Famous — an idea I hadn’t thought of, but yes, pinocchio and marge hitler is pretty funny. Somehow I suspect it might lead to collisions though (hitler is a stronger signal than marge)
    3) Constructed — “ponno and jib quona” or some other ridiculous combination of name-y words.

    I may try all three.

    There is code. Mail if ya want it.

  5. So, if you need special software to either show a face or convert it to a set of names anyway, you could as well encrypt the fingerprint with some user entered key and it will be more difficult to fake the fingerprint if you do not know that key.
    Can I have that 4th beer please?

Leave a Reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.