Hi there. I was wondering if Dictionary Pass-Phrases are somewhat good so that the time required to break them is long enough. So, I usually use passwords like: "_xJ3Bo9<A1.lcv7>0pPHy5Va,jbC2Z(iOp+4MXK" with 64 characters, but these are hard to remember. Then, I came with a website that tests how long it would take for a brute-force-attack to break your passwords and somehow "correcthorsebatterystaple" is more difficult to break than a short random-character password. The question is: Would a pass-phrase with, say 8 words (all random and picked from the Dictionary), be strong enough so that it is impossible to break it in say 10 years? Or should I stick with my random ones? I say this because I use TrueCrypt on Linux, and my security scheme is: * A 50MB partition (with Serpent-Whirlpool) that holds the Key-Files for the next partition. This partition is encrypted with random words and it's pass-phrase is 64 characters long. * After De-Crypting the 1st partition, I must use the KeyFiles stored in it in order to De-Crypt this 2nd 50MB partition (with Serpent-Whirlpool), which is also encrypted with random words and it's pass-phrase is 64 characters long. * After De-Crypting the 2st partition, I must use the KeyFiles stored in it in order to De-Crypt this 3rd partition (Data partition, with Serpent+AES-Whirlpool), which is Encrypted with a 64 character random-manually-generated-password with no Key repetitions.