Real Impact
In 2012, LinkedIn suffered a data breach exposing 6.5 million password hashes. Because many users chose weak passwords like '123456' or 'linkedin', attackers cracked millions of them within hours. Strong passwords would have taken centuries to crack.
Your Objective
Create a password that scores "Strong" or "Very Strong" to complete this challenge.
Instructions
- Type a password in the box below (don't use your real passwords!)
- See instant feedback on how strong it is
- Experiment with different approaches: short vs long, simple vs complex
- Try to understand WHY some passwords are stronger than others
123456qwertySummer2024!john1990
correct horse battery stapleMyDog$Ate3Pizzas!the-quick-brown-foxQdRWgrM3LxukPW
💡 Need Help?
Hints reveal progressively more information. Try to solve it yourself first!
Password strength is measured by how long it would take an attacker to guess it. Attackers use automated tools that can try billions of combinations per second. The key factors are: length, unpredictability, and avoiding common patterns.
Attackers know that humans are predictable. They try: dictionary words, names + birthdays, keyboard patterns (qwerty), common substitutions (@ for a, 3 for e), and seasonal patterns (Summer2024!). Avoid these patterns.
The strongest approach is using a passphrase: 4+ random words strung together. This creates length (the most important factor) while remaining memorable. Alternatively, use a password manager to generate and store random passwords.
Further Reading
Tip: Check if your email or existing passwords have been compromised using Have I Been Pwned — it's safe and privacy-respecting.