I often boot into TAILS livecd and start making a bunch of throwaway accounts... for example this reddit account.
But it's a real bitch to remember passwords. I've made a simple password manager that uses your "seed or master password" to generate passwords based on the url and username. url could even be electrum for the local wallets password and then you could have various usernames for different wallets like "default_wallet".
The way it works is it uses a sha512 hash of your seed as a salt to generator passwords like so sha512(username+url+sha512(seed)).
Thus it deterministically makes passwords based on url, username and your master pass. This was inspired by and is as secure as how electrum will generate unrelated but deterministic wallet addresses from a seed. Given one wallet, no one could work out your seed or other wallets. Same with this.
This way if you come on here and need to regain your throwaway all you need to remember is your seed. Plus! So long as you don't reuse the url you can keep using the same seed.
I stress, while I can not think of any major issue with this scheme IT IS NOT AS SECURE AS RANDOM PASSWORDS GENERATED BY A PASSWORD MANAGER.
This is purely for convience, I never use it to handle a "value" account.
#!/usr/bin/env python
import hashlib, sys, getpass
masterp = getpass.getpass('Master password/seed: ')
hmasterp = hashlib.sha512()
hmasterp.update(masterp)
masterp = hmasterp.hexdigest()
while 1:
url = raw_input('URL: ')
uname = raw_input('username: ')
password = hashlib.sha512()
password.update(masterp)
password.update(uname)
password.update(url)
print password.hexdigest()[0:16]
This way you don't even need a persistant present to use these accounts.
Here is example usage.
amnesia@amnesia:~/pass_tool$ ./pass_tool
Master password/seed:
URL: reddit.com
username: bucktooth_fuck_442
38486e7596d05d60
URL: reddit.com
username: bucktooth_fuck_442
38486e7596d05d60
URL: electrum
username: default_wallet
8fb4aa181dfcaa3f
Master pass is blank as it hides input to protect your password.
Pro tweaks:
Alter the output to take more characters from the hash 24 should provide you with a nice 90+bits of security up to say 100bits (~4 bits per char max).
Example:
print password.hexdigest()[0:24]
Seeing all these next level OPSEC and I'm here with jackshit (not even tails), I get kinda paranoid... til a bar chills me out.