Xentropic Labs

Your Password Sucks (And You Know It): Why StrongAF Passwords Uses Profanity to Keep You Secure

>> Join the Tester Group << Request access to the private beta (approval is immediate)

>> Download on Google Play << Install the app and start testing immediately


Let me tell you something you already know: you reuse passwords. Maybe not everywhere, but definitely somewhere. You’ve got your “important stuff” password, your “who cares if this gets hacked” password, and maybe one or two variations in between. And when you do try to create a “secure” password? You write it down, save it in a notes app, or give up after the third password reset and go back to Summer2024!

I’m not judging you. I’m building for you.

The Problem: Security Theater vs. Actual Security

Every password generator in existence will spit out something like xK9#mL2$vQ7@wR4 and congratulate you on creating an “extremely secure password.” And they’re technically right–that password has high entropy, uses mixed case, includes numbers and symbols, and would take approximately 47 centuries to crack with brute force.

There’s just one tiny problem: you will never remember it.

Here’s what actually happens:

  1. You generate the perfect password
  2. You immediately forget it
  3. You write it down (defeating the purpose)
  4. Or you save it in your browser (potentially insecure)
  5. Or you click “forgot password” every single time
  6. Or–most likely–you just go back to using Password123! everywhere

Microsoft’s 2016 Password Guidance found that password complexity requirements don’t actually improve security–they just make people write passwords down or reuse variations. The 2024 Verizon Data Breach Investigations Report found that 38% of breaches used compromised credentials, while research from Bitwarden shows that 85% of people worldwide reuse passwords across multiple sites–the #1 cause isn’t sophisticated hacking, it’s password reuse.

Here’s the uncomfortable truth nobody wants to say out loud: a “weak” password you actually use and remember is infinitely more secure than a “strong” password you can’t recall, reuse everywhere, or store insecurely.

The Memory Problem

Human memory isn’t built for random strings–it’s built for stories, emotions, and shocking content. Research shows we remember emotional, taboo, and humorous information far better than abstract data. This is why the XKCD “correct horse battery staple” approach works: random words create memorable stories.

But why use boring words when profanity burns itself into your memory through pure shock value?

Enter StrongAF Passwords

StrongAF Passwords is an Android app that generates high-entropy passphrases using curated dictionaries of funny, suggestive, and downright inappropriate language. The philosophy is simple: generate passwords that are both cryptographically strong AND actually memorable.

StrongAF Passwords app interface showing generated password with confetti celebration and customization options
The app in action: Generated password “Bollocks$1ly-Cr4ppyl-N1ppl&” with celebration confetti and full customization panel


Get the App

Join the beta test and start generating memorable passwords today:

>> Join the Tester Group << Request access to the private beta (approval is immediate)

>> Download on Google Play << Install the app and start testing immediately

Limited to first 50 testers - Free lifetime access for all beta participants


How It Works

Hold-to-enhance generation: Select your word count, then press and hold the button. The longer you hold, the more character substitutions happen (a->4, e->3, o->0, s->5, etc.), replacing letters with numbers and symbols. Real-time feedback shows your security level ramping up.

Themed dictionaries with ~3,200 words:

Example: D1ck-Throbb1ng-Pounding-Rag1ngly-Tw@t-M@ssive (6 words, 48 characters)

Unlike xK9#mL2$vQ7@wR4, you’ll actually remember it.

The Security Math

Important: Entropy depends on HOW a password is generated, not what it looks like.

A password’s entropy is calculated based on the method used to create it. Standard password meters see “correcthorsebatterystaple” as 25 random lowercase letters (117 bits!), but that’s wrong–it’s actually 4 words selected from a 2,048-word dictionary, giving it only 44 bits. Security assumes an attacker knows your generation method (Kerckhoffs’s principle).

StrongAF: ~90 bits of entropy from:

Comparison by generation method:

StrongAF achieves near-random password strength while remaining memorable. All generation happens locally on your device.

Is This For You?

Use it for: Personal email, social media, gaming, banking, password manager master passwords Don’t use it for: Work accounts, shared accounts, anywhere you’d need to say it out loud

Look–this isn’t for everyone. But this beats Password123!, beats reusing passwords, and beats writing them on sticky notes. Perfect security doesn’t exist. The best password is the one you’ll actually use.

If reading this made you think “wait, I’d actually remember that password”–that’s exactly the point.


Get the App

Ready to try it? Join the beta test now:

>> Join the Tester Group << Request access to the private beta (approval is immediate)

>> Download on Google Play << Install the app and start testing immediately

Limited to first 50 testers - Free lifetime access for all beta participants


Footnotes & References:

  1. Microsoft Password Guidance (2016): https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf

  2. Bonneau, J., Herley, C., van Oorschot, P.C., & Stajano, F. (2012). “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.” IEEE Symposium on Security and Privacy. https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf

  3. Shay, R., Komanduri, S., Durity, A.L., Huh, P.S., Mazurek, M.L., Segreti, S.M., Ur, B., Bauer, L., Christin, N., & Cranor, L.F. (2016). “Designing Password Policies for Strength and Usability.” ACM Transactions on Information and System Security, 18(4). https://users.ece.cmu.edu/~lbauer/papers/2016/tissec2016-password-policies.pdf

  4. Verizon 2024 Data Breach Investigations Report: https://www.verizon.com/business/resources/reports/2024-dbir-data-breach-investigations-report.pdf

  5. Bitwarden (2025). “Security habits around the world: A closer look at password statistics.” https://bitwarden.com/blog/a-closer-look-at-password-statistics/

  6. Komanduri, S., Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F., & Egelman, S. (2011). “Of Passwords and People: Measuring the Effect of Password-Composition Policies.” CHI Conference on Human Factors in Computing Systems. https://users.ece.cmu.edu/~lbauer/papers/2011/chi2011-passwords.pdf

  7. NIST Special Publication 800-57 Part 1 Rev. 5 (2020). “Recommendation for Key Management: Part 1 - General.” https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf

Technical Note: All entropy calculations based on Shannon entropy formula with actual dictionary sizes from codebase. Character substitution probabilities calculated from replacement map frequency analysis.

Building zopcua: A Type-Safe OPC UA Library for Zig