Re: advice to the government
Forget long password strings.
Personal Identification Devices. Old as Secret Government Computing and working since steel-jacketed greenscreen TTY-era VDUs.
In order to enact a hack one would not only need to make copies of the PIDs used (which can be themselves time-limited), but you would need to have physical access to the equipment they permit access to as well, involving getting through whatever hard security is in place.