While I agree with most of this article, Adida says that a "full-strength, randomly generated, user-managed key" implies that "Enabling a new device requires coordination with an existing device". This is <i>typically</i> the case with current systems, but it is not <i>necessarily</i> the case. It is eminently practical for a human being to memorize an xkcd password with enough entropy to resist brute-force attacks into the foreseeable future.<p><a href="http://lists.canonical.org/pipermail/kragen-hacks/2012-April/000538.html" rel="nofollow">http://lists.canonical.org/pipermail/kragen-hacks/2012-April...</a> demonstrates encoding an 80-bit random number (which is plenty secure with a reasonable key derivation function) as each of "point pleased intense de maybe fairly arms", "bejuso jejigi nububi bidoda gahano", "ADD DOTE BID HILT LAUD MAIN CALF CITY", and "仴薦肨縨猯鹽", any of which is eminently practical to memorize. I use this program to generate my login passwords these days.<p>(80 bits is not enough for a key for something like AES, because you can try a lot of different keys per second. It's plenty if you have a decent key derivation function to add a 25–35-bit work factor.)<p>This is different from a user-chosen password because users are often highly predictable in their password choice.