THIS WEBSITE EMPHASIZES THAT THESE ARE ONLY SUGGESTED METHODS OF PASSWORD SELECTION. THERE ARE MANY OTHER METHODS OF SELECTION AVAILABLE ONLINE WHICH YOU COULD USE. PLEASE SEE OUR DISCLAIMER MESSAGE ON OUR HOMEPAGE
here.
Create a password for Method 1 and 2 the usual way you would create a password. It is suggested you choose at least between 10-14 characters (the more the better). Read up online on the different ways to safely choose a password. It is not as essential (but is still highly important) to have an impossible to guess password for Methods 1 and 2 because there are secondary security measures in place with these methods, and in our opinion, it is important to be able to quickly and easily type it into your computer. If you lose or forget this password, it is normally easy to reset it and the Bitcoins are not permanently lost. Also, if this password is somehow discovered, you can more easily change it to another one and a thief will not suddenly know the password to all your highly sensitive password protected documents where your larger amounts of bitcoins are stored.
For Methods 4 and 5 however, as you don’t regularly enter this password and need the password to be extremely secure far into the future (over the next few decades possibly), your password should be between 26-32 characters long. The password must never be entered into a potentially insecure malware compromised computer (see our ‘keyloggers and malware’ article in the security section). This 26-32 character password is a password you never want to lose or have stolen and will be the same single password you use to secure ALL your Method 4 and Method 5 files. Securing all your highly sensitive data in this way will mean you only need to ever remember one single password which makes it easier to hide and easier to remember. The creator of this website has come up with a unique, highly secure and easy to remember approach to choosing a good password of this length. This approach can only be seen after downloading the pdf document file available for download from the Downloads section.
Method 3 is a special case and the password used depends on whether it has been additionally encrypted in TrueCrypt 7.1a or not. If it has not been encrypted in the additional TrueCrypt 7.1a layer then use the 10-14 character password like the one you would use for Method 1 or 2. If it has been encrypted in the additional TrueCrypt 7.1a layer then use the 26-32 character password like the one you would use for Method 4 or 5.
What about Method 6? Method 6 password selection is derived from security questions or random dice rolls. Therefore, the security of the file is dependent not on the password but on the security questions or random dice rolls you choose to code that password. You should not, and are not, expected to ever memorize the security questions or the random dice rolls. It is possible if you like, for you to prepare a second coded text document where you have your 26-32 character master password decode to the Method 6 password (like what we did in Method 5: step 1), and this will grant you quicker and easier access to your Method 6 secured files.