Overdose
Member
+13|6383|Fort Worth, TX
This is a little something i found on the front page of yahoo.

THE best password is a long, nonsensical string of letters and numbers and punctuation marks, a combination never put together before. Some admirable people actually do memorize random strings of characters for their passwords — and replace them with other random strings every couple of months.

Then there’s the rest of us, selecting the short, the familiar and the easiest to remember. And holding onto it forever.

I once felt ashamed about failing to follow best practices for password selection — but no more. Computer security experts say that choosing hard-to-guess passwords ultimately brings little security protection. Passwords won’t keep us safe from identity theft, no matter how clever we are in choosing them.

That would be the case even if we had done a better job of listening to instructions. Surveys show that we’ve remained stubbornly fond of perennial favorites like “password,” “123456” and “LetMeIn.” The underlying problem, however, isn’t their simplicity. It’s the log-on procedure itself, in which we land on a Web page, which may or may not be what it says it is, and type in a string of characters to authenticate our identity (or have our password manager insert the expected string on our behalf).

This procedure — which now seems perfectly natural because we’ve been trained to repeat it so much — is a bad idea, one that no security expert whom I reached would defend.

Password-based log-ons are susceptible to being compromised in any number of ways. Consider a single threat, that posed by phishers who trick us into clicking to a site designed to mimic a legitimate one in order to harvest our log-on information. Once we’ve been suckered at one site and our password purloined, it can be tried at other sites.

The solution urged by the experts is to abandon passwords — and to move to a fundamentally different model, one in which humans play little or no part in logging on. Instead, machines have a cryptographically encoded conversation to establish both parties’ authenticity, using digital keys that we, as users, have no need to see.

In short, we need a log-on system that relies on cryptography, not mnemonics.

As users, we would replace passwords with so-called information cards, icons on our screen that we select with a click to log on to a Web site. The click starts a handshake between machines that relies on hard-to-crack cryptographic code. The necessary software for creating information cards is on only about 20 percent of PCs, though that’s up from 10 percent a year ago. Windows Vista machines are equipped by default, but Windows XP, Mac and Linux machines require downloads.

And that’s only half the battle: Web site hosts must also be persuaded to adopt information-card technology for sign-ons.

We won’t make much progress on information cards in the near future, however, because of wasted energy and attention devoted to a large distraction, the OpenID initiative. OpenID promotes “Single Sign-On”: with it, logging on to one OpenID Web site with one password will grant entrance during that session to all Web sites that accept

OpenID credentials.

OpenID offers, at best, a little convenience, and ignores the security vulnerability inherent in the process of typing a password into someone else’s Web site. Nevertheless, every few months another brand-name company announces that it has become the newest OpenID signatory. Representatives of Google, I.B.M., Microsoft and Yahoo are on

OpenID’s guiding board of corporations. Last month, when MySpace announced that it would support the standard, the nonprofit foundation

OpenID.net boasted that the number of “OpenID enabled users” had passed 500 million and that “it’s clear the momentum is only just starting to pick up.”

Support for OpenID is conspicuously limited, however. Each of the big powers supposedly backing OpenID is glad to create an OpenID identity for visitors, which can be used at its site, but it isn’t willing to rely upon the OpenID credentials issued by others. You can’t use Microsoft-issued OpenID at Yahoo, nor Yahoo’s at Microsoft.

Why not? Because the companies see the many ways that the password-based log-on process, handled elsewhere, could be compromised. They do not want to take on the liability for mischief originating at someone else’s site.

When I asked Scott Kveton, chairman of the OpenID Foundation’s community board, about criticism of OpenID, he said candidly, “Passwords, we know, are totally broken.” He said new security options, such as software that works with OpenID that installs within the browser, are being offered. When it comes to security, he said, "there is no silver bullet, and there never will be.”

Kim Cameron, Microsoft’s chief architect of identity, is an enthusiastic advocate of information cards, which are not only vastly more secure than a password-based security system, but are also customizable, permitting users to limit what information is released to particular sites. “I don’t like Single Sign-On,” Mr. Cameron said. “I don’t believe in Single Sign-On.”

Microsoft and Google are among the six founding companies of the Information Card Foundation, formed to promote adoption of the card technology. The presence of PayPal, which is owned by eBay, in the group is the most significant: PayPal, with its direct access to our checking accounts, will naturally be inclined to be conservative. If it becomes convinced that these cards are more secure than passwords, we should listen.

BUT perhaps information cards in certain situations are convenient to a fault, permitting anyone who happens by a PC that is momentarily unattended in an office setting to click quickly through a sign-on at a Web site holding sensitive information. This need not pose a problem, however.

“Users on shared systems can easily set up a simple PIN code to protect any card from use by other users,” Mr. Cameron said.

The PIN doesn’t return us to the Web password mess: it never leaves our machine and can’t be seen by phishers.

Unlearning the habit of typing a password into a box on a Web page will take a long while, but it’s needed for our own protection. Logging on to a site should entail a cryptographic conversation between machines, saving us from inadvertently giving away the keys.

No more relying on our old companion “LetMeIn.”

ying on our old companion “LetMeIn.”

Randall Stross is an author based in Silicon Valley and a professor of business at San Jose State University. E-mail: stross@nytimes.com.
Original link: http://www.nytimes.com/2008/08/10/techn … technology

A +1 to vista!
Noobpatty
ʎʇʇɐdqoou
+194|6622|West NY
Wait so what they're trying to do is basically make things only accessable by the pc the account or whatever is made from?
CrazeD
Member
+368|6941|Maine
So, basically all that says is that people are stupid and don't pay any attention to the website they are logging into, so we should make annoying, hard-to-use voice recognition login?

That's just retarded. Passwords are perfectly safe the way they are, no need to complicate something that already works fine. A properly encrypted password of random alpha-numerical characters that is 20+ characters long and changed regularly is damn near impossible to crack. Even without encryption, it would take a very long time to bruteforce.
Overdose
Member
+13|6383|Fort Worth, TX

CrazeD wrote:

So, basically all that says is that people are stupid and don't pay any attention to the website they are logging into, so we should make annoying, hard-to-use voice recognition login?

That's just retarded. Passwords are perfectly safe the way they are, no need to complicate something that already works fine. A properly encrypted password of random alpha-numerical characters that is 20+ characters long and changed regularly is damn near impossible to crack. Even without encryption, it would take a very long time to bruteforce.
Can you remember the 20 letter alpha-numerical password for your bank account? Let alone the password changing every month.
The#1Spot
Member
+105|6808|byah
Now it would be cool if there was a finger print scan as proof to the account you own. But then again touch screens are not common and scan recognition would be expensive.
Freezer7Pro
I don't come here a lot anymore.
+1,447|6465|Winland

I like my current password, "penis". It's so obvious that no-one would guess it.



































Spoiler (highlight to read):
Bet you just tried to log onto my account. HA! I made you type "penis"
The idea of any hi-fi system is to reproduce the source material as faithfully as possible, and to deliberately add distortion to everything you hear (due to amplifier deficiencies) because it sounds 'nice' is simply not high fidelity. If that is what you want to hear then there is no problem with that, but by adding so much additional material (by way of harmonics and intermodulation) you have a tailored sound system, not a hi-fi. - Rod Elliot, ESP
CrazeD
Member
+368|6941|Maine

Overdose wrote:

CrazeD wrote:

So, basically all that says is that people are stupid and don't pay any attention to the website they are logging into, so we should make annoying, hard-to-use voice recognition login?

That's just retarded. Passwords are perfectly safe the way they are, no need to complicate something that already works fine. A properly encrypted password of random alpha-numerical characters that is 20+ characters long and changed regularly is damn near impossible to crack. Even without encryption, it would take a very long time to bruteforce.
Can you remember the 20 letter alpha-numerical password for your bank account? Let alone the password changing every month.
Sure, if you use it often it's not that hard tbh.

Besides, my bank uses a site key and a security question before you can login, so your password doesn't have to be uber leetsauce.
Titch2349
iz me!
+358|6620|uk

Random concations of characters for a password is more secure that a normal word....

If you see someone typing in a password, and you see them type in a few of the characters, you can have a pretty good guess what the remaining character(s) is to crack the password, as it is a word that everyone knows.

If however, their password is random characters- its just that- random, so it is much harder to guess.

A similar scenario- you type your password into the username field by accident, and someone sees it- if its a word, they can memorize it instantly- but good look doing that for a random 20 char password.

Learning a random sequence isn't that hard- My first random password was the serial number of one of the computers in our IT classroom, and I spent the lesson learning it- still remember it now, even though nothing uses it anymore. My next random one was part of my BF2 serial Key, and then my most secure passwords consist of both of these passwords stuck together.....
max
Vela Incident
+1,652|6835|NYC / Hamburg

Freezer7Pro wrote:

I like my current password, "penis". It's so obvious that no-one would guess it.
Spoiler (highlight to read):
Bet you just tried to log onto my account. HA! I made you type "penis"
I know your PC password and can log in whenever I want. Muhahahahahahahahaha
once upon a midnight dreary, while i pron surfed, weak and weary, over many a strange and spurious site of ' hot  xxx galore'. While i clicked my fav'rite bookmark, suddenly there came a warning, and my heart was filled with mourning, mourning for my dear amour, " 'Tis not possible!", i muttered, " give me back my free hardcore!"..... quoth the server, 404.
mikkel
Member
+383|6869
I love how these misguided security analysts use arguments like "Password-based log-ons are susceptible to being compromised in any number of ways. Consider a single threat, that posed by phishers who trick us into clicking to a site designed to mimic a legitimate one in order to harvest our log-on information. Once we’ve been suckered at one site and our password purloined, it can be tried at other sites." to argue for the concept of centralised credentials stored on a physical object.

Passwords can be pharmed for single sites, but accessing other accounts on other sites requires the pharmer to not only try a fucktonne of sites hoping for the best, but leaves him relying on the username and the password being the same, which is rarely the case, especially for secure systems. An "identification card", however, would simply need to be stolen, and it's game over. Stealing a physical object is a lot easier than stealing a username and a password. The point of a password is that you won't have to trust anyone or anything else outside of a credential establishment scenario with your personal identification, and that's done for a good reason.

Last edited by mikkel (2008-08-10 05:47:47)

steelie34
pub hero!
+603|6649|the land of bourbon
i totally agree with mikkel here... if you fall for a phishing site, then you aren't much of a security analyst...  different passwords for different sites are the safest way to go.  if you can't remember them all, store them in an encrypted file.
https://bf3s.com/sigs/36e1d9e36ae924048a933db90fb05bb247fe315e.png
usmarine
Banned
+2,785|7030

1234
G-NOT_(:0)
Banned
+19|6268

Freezer7Pro wrote:

I like my current password, "penis". It's so obvious that no-one would guess it.




























Spoiler (highlight to read):
Bet you just tried to log onto my account. HA! I made you type "penis"
hmm...

Board footer

Privacy Policy - © 2025 Jeff Minard