Spoken Passwords

What do shibboleth, coffin varnish, monkey rum, and tarantula juice have in common? They are all spoken passwords! Spoken passwords were one of the earliest forms of keys. Instead of a physical key, it was a spoken word to allow entry or access into a place. Earliest uses of the spoken password were used in warfare. In Ancient Rome spoken passwords were referred to as “watchwords” and the watchword would be spoken around an encampment to ensure no spies had infiltrated. While it had several practical uses in warfare, the spoken word password erupted in popularity after the 18th amendment had passed. Speakeasies erupted out of the ashes of prohibition, but a code was required for entry. Oftentimes this code was a ridiculous string of words such as panther sweat, but regardless of what the spoken password was it kept people drinking and the law enforcement out!

Spoken passwords are another form of keys, instead of relying on an object such as a chest, another person acts as the chest while the key is the password! Spoken passwords resulted in personal connections as this key would have to be talked about and spread around to ensure that all “keyholders” had access. Instead of physical keys being lost, the equivalent was a code word being forgotten. While someone can steal a key to get into a locked location, spoken passwords have different weaknesses. Vulnerabilities of spoken passwords consist of people eavesdropping to get the key.

An extreme example of the spoken password being used and eavesdropped was the complex code communication methods of World War II. During a time when radio calls could be intercepted over air, the only way to communicate secretly was through spoken passwords. Nazi Germany was dominating the spoken password system during World War II. Code “Ultra” was uncrackable and the key was right in front of the allied intelligences. The Enigma Machine was the key to the spoken password yet was almost impossible to crack. It took several mathematicians and years of work to crack. Eventually the spoken password was cracked by Alan Turing and resulted in the beginning of the turn of the tide in World War II towards the allies. Since the allies now had the key to the code, the chest of military intelligence and top secret information was now open.

In the 21st century, spoken passwords are a less common form of password as many different technologies make spoken passwords obsolete. The 21st century rendition of a spoken password is computer recognized vocal recognition. Instead of relying on a person saying a code word a computer listens to a person’s voice tone, pitch, and accent as the key to a locked location. With less vulnerabilities as it is nearly impossible to crack the code of someone else’s voice, computer recognized vocal recognition provides the most up to date and secure version of the spoken password.

In conclusion the key of a spoken password has been modified and adapted for uses in warfare and speakeasies. With its new adaptation in the 21st century of technology providing the new spoken key of a person’s voice, the spoken key has survived throughout history and remains relevant to today.

5 thoughts on “Spoken Passwords

  1. Hi Joe! I love that first sentence. This really opened my eyes to how language is a part of material culture. Your take on this was so interesting as I had never thought about passwords this way and I learned so much from your writing! The ways in which there are flaws in both types of keys is something I never thought about. Great job!

  2. Hi Joe! You bring up so many intriguing points on how keys are used as ways to communicate by sending encoded messages. After reading your post, I wonder if we would make the change to using vocal recognition to secure our possessions. Would voice actors or impersonators hold the new key to access? Some software applications have difficulty making out some words and phrases if an individual has an accent. For instance, I am learning Mandarin, but I have an American accent while speaking in Chinese. My New York accent prevented Google Translate from accurately picking up some of my spoken messages when I used its “push-to-talk” feature. I like that you mentioned the Enigma machine, which encrypted so much critical and sensitive information during WWII. (I did watch The Imitation Game a few years ago, and it’s a “must-see film!) Encryption and decryption remain a growing concern, especially within cryptography and data security. Amazing work Joe!

  3. Hi Joe! I really enjoyed how you introduced your topic and talked about the history of spoken passwords. This really added some depth to your post and gave the reader some information about spoken passwords that they probably didn’t know before reading this. I also really enjoyed how you related your topic to the modern day and acknowledged its change in form due to technology. I never realized how prevalent passwords were in our everyday lives. Awesome presentation and post overall:)

  4. Hi Joe! That first sentence grabbed my attention right away! I found it so interesting to learn about the significance of spoken passwords throughout history and how technology comes into play in the recent years as a form of protection and security. Reading this has really changed my perspective on spoken passwords and their impact and significance it still has to this day. Great work!

  5. Hi Joe, I loved how you connected the history of spoken passwords to the ways in which we use them in the present, I think that makes it a lot more relevant and interesting especially since we don’t usually equate spoken passwords to keys.

Leave a reply to Saj Cancel reply