@Green_Turtle
Just in case you were taking this seriously (sorry, can't quite tell):
I have heard that advice of using 4 "random" words (from people claiming some authority on the topic), and it is not really good advice.
1: it's 2^44 bits of entropy, not very safe these days
2: humans can't make random things up, so it's actually less
3: using the same system as many others is bad
4: password managers, people!
https://diogomonica.com/2014/10/11/password-security-why-the-horse-battery-staple-is-not-correct/
https://security.stackexchange.com/questions/62832/is-the-oft-cited-xkcd-scheme-no-longer-good-advice
@Green_Turtle @fribbledom
This one is a decent explainer of how password cracking _actually_ works and what makes a good/bad password:
https://invidio.us/watch?v=7U-RbOKanYs
I do two things:
1: https://keepass.info/ to generate passwords too complicated to remember (Win/Linux/Android/..iOS?), and store all my PWs.
2: https://sourceforge.net/projects/pwgen-win/ (sorry windows only...) for memorable passwords (e.g. for keepass) -- mix and match schemes, aim for >80 bits of entropy, then make a truly random sample.