Owen -

Good observations...


Why?
1 - To be secure, you depend on the ISP to be secure. That's OK, but does fail often.
Do you mean the server(s) and intranet of the service being used? Or do you mean your (and their) first-mile provider? If you mean the former, any service is only as secure as the one you are entrusting to provide it.
2 - Apparently length of passwords is the high order bit for crackibility. We humans dislike typing 20 character passwords, especially on our phones, and its extremely likely to be miss-typed at least once, probability of typo goes up with each keystroke.
Complexity order M^N goes up faster than N^M for increasing N (the length of the string matters more than the size of the alphabet for brute-force). I find long passwords just fine if I have a keyboard. Admittedly, my mental password generator is mnemonic, but not particularly dictionary-worthy.

3 - We are also instructed to have a different password for each login. Humans simply cannot do that, they are limited. Thus they resort to a formula like two phrases with a 3-4 character difference in the middle, with some significance like "azn" or "books" for amazon.
Significance can be metaphorical or appositional too. In my own case, I apply rood concepts (with mangled spelling) to avoid the temptation to *ever* share my password or allow it to be stored in clear text.. they are just appalling. I suspect someone has done a study on how much complexity using ideosyncratic phonetic spelling variations expands the dictionary. I suppose it does nothing for rainbow table and brute-force attacks. It also gives me a little bit of satisfaction each time I diss Jeff Bezos, Steve Jobs, Bill Gates in street argot not even likely to be found on the internet.

4 - Most ISPs have their own rules for passwords, and likely any formula will fail on a percentage of them. Thus a formula will only work part of the time. Maybe there is a subset that most ISPs accept? I found UNM, and my bank, for example, failed to accept a formula I tried.
I have backup (back-down) plans for overly restrictive systems... especially those that don't like special characters or caps..

5 - This leads to keepass, 1password etc to remember all your passwords for you. Silly, but still appears reasonable. But they typically fail in certain situations. Ex: they are designed for browser use so are plugins/bookmarklets. But what if you have a phone "app". Won't work. So you have to do stupid tricks to go to the pw app and cut/paste.
Yes, clumsy.

6 - The latest trend to improve this is two-fold:
6.1: Reduce number of logins: Use OAuth to have just a few accounts that are very secure. As soon as twitter, google, facebook, moz, yahoo, ... and the rest of the "standard ISPs" all have OAuth (or equivalent), and are used by the vast majority of the other sites (forums, stores, ..) we have reduced the complexity of the user. Probably will work with all non-creditcard sites.
I like the convenience but don't like having my eggs in a single basket. I'm giving over to it for "trivial" services... for example, AutoCad's 123d products let me defer to Google Login. Yes, this lets the NSA right into my business (where they surely already are anyway) and anyone *else* who can hack Google. I trust Google more than Facebook for this. But I'm not inclined to do this with my Bank, with Amazon, etc.
6.2: 2-factor: How make more secure? So far 2-factor works out pretty well. It would require a standard pin generator, google's is pretty effective. Have to do this to reduce the pile of silly physical pin generators.
Two-factor also implies two of: "who you are", "what you have", "what you know". So, an ATM card and a PIN or a retinal scan and a PIN are better than a password and a PIN.

I'm not sure this will work, its too complicated for most people. We might be able to have a single pin dongle for 2-factor, could help. Thus far 2-factor for me has been the best, and I use that account via OAuth for all the forums, mail lists etc that accept that. Even stores as long as they don't keep the credit card info.
LANL (and all of DOE/DOD?) has been using clock-synced CryptoCards for a long time (15 years?)... Ray may know more of their potential vulnerabilities but for a single two-factor authentication, I think they are as good as it gets still?

The fallback is a password keeper as mentioned above. But do you really want it to keep all your passwords? You're dead without it (travel etc) and it simply doesn't work in all situations (apps vs browser) and its a bit creepy to depend on a computer program for all your security.
I've always felt terribly vulnerable (especially international travel) knowing that I was "dead" (in the water) without my ID. And by extension, my wallet. Thus all the shenaniganry of keeping photocopies of everything in a separate place from your wallet, etc.

My last trip to europe, I photographed everything with my iPhone (including my reservations, iteneraries, passport, driver's license, credit cards (front only, memorizing my security code)), mostly out of convenience (so, at a glance I could get certain info without rummaging, etc.). Unfortunately it would have been a rich storehouse (the only things missing from it were things committed to memory like Soc Sec, Mothers Maiden, PINs, passphrases/passwords) for identity thieves. I also managed to (temporarily) disable my phone by dropping it into a 1" deep cup of icewater (don't ask) which completely bolloxed an important plan for the next morning. Fortunately the water *only* interfered with the backlight (took me a while to figure that out) and when it dried 12 hours later, came back to normal, but made me aware of how dependent I was on that single device (in this case google map directions/address and a phone number of a contact)



Sigh.
I felt *very* uncomfortable leaving my passport with people (hotels, etc.) who used it as a simple "surety" measure.

We haven't really *solved* the problem of identity /en Verite/ yet, why do we think we can solve it /en Virtu/?

Sigh,
 - Steve
PS.. it is worth noting that a great deal of the mechanisms of molecular biology (especially virology) have a lot in common with this problem... self-vs-other and defeat mechanisms using massively parallel attacks.

============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to