Hipkiss
random character hash is easier to crack
Do you have a link for that? Because I found, in fact, a blog article on said site which states the opposite: Higher entropy = more secure password (link). Using words in your password yields lower entropy (because of letter-occurrence in natural language) and, additionally, allows attackers to use dictionary attacks and find your password a lot faster versus using something random... So instead of using 30 characters of words, you should use 30 characters or random hash, as you will achieve a higher entropy that way.
If you have to remember a password (and there is no way to use a password manager), writing out a sentence as passphrase might be a good start to achieve a long password with a better entropy, however, I recommend to at least jumble in another natural language. Most dictionary attacks can do common replacements, like a -> @ , however they usually can only handle a set number of languages. I like to do English/German/Japanese combinations. That's something an attacker has a hard time working out (since that combination is not very common), it makes letter prediction worthless and it opens up a lot more possible words to test against. For example Today'sTenkiissehrnicedesuyo! (which has an entropy of ca. 80 to over 100, depending on the character set used, which is quite strong! If you need more, why not use unicode characters directly? Just use Kanji or Cyrillic alphabet)