Re: secure uitextfield is not secure

2014-03-06 Thread William Squires
  I believe it's because of the virtual on-screen keyboard - this way you can 
verify whether the character you typed has uppercase or not, since the virtual 
keyboard has no "Caps Lock" LED on it, or just because the iPhone screen 
keyboard keys are so small, it's easy to make a typo when entering your 
password.
  I do wish they (Apple) would make it so that if you're using a wireless 
(bluetooth) keyboard, that it would - in fact - hide the on-screen character(s) 
in a secure TextField. But this behavior has been around since at least when 
they called it iPhone OS, I believe... I could be wrong.
  HTH!

On Mar 5, 2014, at 1:17 PM, Luther Baker  wrote:

> I'm generally a big fan of Cocoa Touch - but why does the "secure" option
> on a UITextField still display the character you are typing?
> 
> And, is there any way I can turn this off?
> 
> Its generally hard to get non-employee AD credentials created or to stand
> up DEV Active Directory services ... so everywhere I've ever worked, folks
> like me are always entering their real AD creds in the app during
> development. This is embarrassing when you are pairing and even worse, was
> in a demo today and the leader is asking everyone "not to look" while they
> entered their AD credentials in front of a whole host of people.
> 
> I guess one could write something to work around this ... but does anyone
> know if that is really necessary - and what would have motivated Apple to
> implement textField.secureTextEntry this way ... or not provide a textField.
> *really*SecureTextEntry option which would mask ALL the characters. Maybe
> an option that doesn't even show how many # the user is actually typing.
> I'm surely not counting 14+ characters anymore.
> 
> -Luther
> ___
> 
> Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)
> 
> Please do not post admin requests or moderator comments to the list.
> Contact the moderators at cocoa-dev-admins(at)lists.apple.com
> 
> Help/Unsubscribe/Update your Subscription:
> https://lists.apple.com/mailman/options/cocoa-dev/wsquires%40satx.rr.com
> 
> This email sent to wsqui...@satx.rr.com


___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-06 Thread Uli Kusterer
On 05 Mar 2014, at 23:57, Quincey Morris  
wrote:
> Incidentally, having a “fully obscured” custom text field won’t help you in 
> the demo scenario, because the audience can still see the key images pop up 
> on the keyboard as you type. Are you proposing removing that feedback too? 
> (And how will you do that?)

 Unless you’re recording, the key caps popping up is less of an issue. They pop 
up in different places, so an audience member’s or shoulder-surfer’s eyes have 
to follow the cap as it’s popping up and read it that moment. At the usual 
typing speed, by the time my eyes have jumped to the key cap, it has closed 
already.

 On the other hand, in the text field it is obvious where the next character 
will pop up, and they show up in the proper reading order, so it is so easy to 
read a password I often do it accidentally.

>> How very sad ... there should really be no way I could influence Apple in
>> this regard. IE: this isn't some elaborate, hard to define bug. This better
>> not be an accident that requires energy from someone as insignificant as me
> 
> I agree with the earlier post which said (more or less) that if it’s your job 
> to demo stuff, then it’s also your (your company’s) responsibility to provide 
> a non-secure demo platform, or a non-secure account.

 Definitely. If data is confidential enough to protect by password access, you 
should be using a demo server with dummy data. That’s better for a demo anyway. 
If you can run that demo server locally, you’re insulated from network issues 
during your demo like other users eating up all the bandwidth or Wifi 
interference.

 If, for some reason that is not an option (why?), having single-use accounts 
or accounts with pseudo-random single-usepasswords is probably the best. That 
way, even if someone sees the password onscreen, it has already changed by the 
time an audience member might enter it.

Cheers,
-- Uli Kusterer
“The Witnesses of TeachText are everywhere...”
http://zathras.de


___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-06 Thread Uli Kusterer
On 05 Mar 2014, at 23:17, Alex Kac  wrote:
> Perhaps a good bug report is that the user’s screen works the same way it 
> does now, but if its mirrored - then the mirrored screen keeps he password 
> hidden. That would be a good use case. 

 That’s a very presenter-specific use case. I have quite a lot of fun at 
conferences/concerts whispering peoples’ passwords back to them from the seat 
behind them as I accidentally shoulder-surf them. For a mobile device, this is 
the wrong solution.

Cheers,
-- Uli Kusterer
“The Witnesses of TeachText are everywhere...”
http://zathras.de


___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Luther Baker
Hey -- this is all good stuff!

I'm definitely a bit less cynical about this topic now.

Thanks for the virtual turn-around!




On Wed, Mar 5, 2014 at 5:41 PM, Kyle Sluder  wrote:

> On Wed, Mar 5, 2014, at 02:57 PM, Quincey Morris wrote:
> > I agree with the earlier post which said (more or less) that if it's your
> > job to demo stuff, then it's also your (your company's) responsibility to
> > provide a non-secure demo platform, or a non-secure account.
>
> Take Luther's app out of the equation.
>
> Due to plenty of circumstances beyond the control of the user (timeouts,
> etc.), it may be necessary to reauthorize to some service during the
> course of presenting data via AirPlay. There is *no way* to securely use
> passwords in combination with AirPlay.
>
> This is a design problem that falls under the same umbrella as "bad
> defaults". The user can optionally cancel whatever password prompt has
> appeared (and keep canceling if the software in question persists in its
> demand), disconnect from AirPlay, enter the password, reconnect to
> AirPlay, and return to the place they left off.
>
> But that's cumbersome. Instead, the software encourages the user to
> enter their password live and on the air.
>
> As I opined in an earlier thread, when AirPlay is engaged
> UISecureTextField should disable echo of the last character. Thanks
> Quincey for reminding me that the balloon keycaps should also be
> disabled.
>
> --Kyle Sluder
>
___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Kyle Sluder
On Wed, Mar 5, 2014, at 02:57 PM, Quincey Morris wrote:
> I agree with the earlier post which said (more or less) that if it’s your
> job to demo stuff, then it’s also your (your company’s) responsibility to
> provide a non-secure demo platform, or a non-secure account.

Take Luther's app out of the equation.

Due to plenty of circumstances beyond the control of the user (timeouts,
etc.), it may be necessary to reauthorize to some service during the
course of presenting data via AirPlay. There is *no way* to securely use
passwords in combination with AirPlay.

This is a design problem that falls under the same umbrella as "bad
defaults". The user can optionally cancel whatever password prompt has
appeared (and keep canceling if the software in question persists in its
demand), disconnect from AirPlay, enter the password, reconnect to
AirPlay, and return to the place they left off.

But that's cumbersome. Instead, the software encourages the user to
enter their password live and on the air.

As I opined in an earlier thread, when AirPlay is engaged
UISecureTextField should disable echo of the last character. Thanks
Quincey for reminding me that the balloon keycaps should also be
disabled.

--Kyle Sluder

___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Quincey Morris
On Mar 5, 2014, at 14:05 , Luther Baker  wrote:

> But I don't think this really justifies the decision. My daughter
> dropped the iPad on her toe but I don't think that warrants rubber bumpers
> on the device :)

Just to emphasize: I wasn’t making a witticism. It’s a genuine problem — 
especially given that in some cases entering multiple incorrect attempts will 
get you locked out of an account. Showing the password in plain text while it’s 
being typed *isn’t* a flaw from my point of view.

Incidentally, having a “fully obscured” custom text field won’t help you in the 
demo scenario, because the audience can still see the key images pop up on the 
keyboard as you type. Are you proposing removing that feedback too? (And how 
will you do that?)

> How very sad ... there should really be no way I could influence Apple in
> this regard. IE: this isn't some elaborate, hard to define bug. This better
> not be an accident that requires energy from someone as insignificant as me


I agree with the earlier post which said (more or less) that if it’s your job 
to demo stuff, then it’s also your (your company’s) responsibility to provide a 
non-secure demo platform, or a non-secure account.

Your position is a bit inconsistent here. You can’t express disappointment in 
Apple’s lack of assiduity, and simultaneously say it’s too much trouble for you 
to take elementary steps to avoid exposing your keystrokes (e.g. pasting in the 
password, or disconnecting your device from the public display while you log 
in, or providing test credentials, etc).




___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Alex Kac

On Mar 5, 2014, at 3:05 PM, Luther Baker  wrote:

>> The only way to find out is to file a radar and see what comes out in iOS
> 8.
> 
> How very sad ... there should really be no way I could influence Apple in
> this regard. IE: this isn't some elaborate, hard to define bug. This better
> not be an accident that requires energy from someone as insignificant as me
>  to ask that secure text fields not echo their contents in Plaintext.

Filing a bug *is* how you influence Apple. Or, buy a few million shares. Or 
become a head of engineering. I mean seriously, if everyone had the same amount 
of influence, then iOS would be Android.

> I guess its no big deal when you think of the naive device use case - where
> someone could simply watch your fingers type on the virtual keyboard ...
> but demos are often on mirrored devices or sometimes use hardware keyboards
> or are fired up the simulator and displayed on the big screen as the team
> watches in earnest to see the week's progress.

Perhaps a good bug report is that the user’s screen works the same way it does 
now, but if its mirrored - then the mirrored screen keeps he password hidden. 
That would be a good use case. 

> 
> Again, I'm OK with it. I like writing custom controls. Just find it
> interesting ... there has to be _some_ reason we haven't uncovered yet :)
> Wanted to see if anyone had an elegant solution or if I'd missed something
> in the API.

The good reason was already provided - MOST people cannot enter a password on a 
soft keyboard without seeing the character they just pressed.
___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Luther Baker
Yep - cool. I'm not too dismayed and take it as it comes but I'm just
seriously surprised. It seems like a very obvious use case.

Google Mail does email differently and I think they justify it by _selling_
you a different way to look at your email. I have a hard to rationalizing
this in a similar fashion.

> Because (in my own case) I'm incapable of typing a password correctly
using the on-screen keyboard unless I can see when I've pressed the wrong
key.

:) true. But I don't think this really justifies the decision. My daughter
dropped the iPad on her toe but I don't think that warrants rubber bumpers
on the device :)

Just say it out loud a few times ...

*passwords appear in plaintext as you type them ..*
*passwords appear in plaintext as you type them ..*
*passwords appear in plaintext as you type them ..*
*passwords appear in plaintext as you type them ..*

I guess this would be a good idea for hermits :)

> The only way to find out is to file a radar and see what comes out in iOS
8.

How very sad ... there should really be no way I could influence Apple in
this regard. IE: this isn't some elaborate, hard to define bug. This better
not be an accident that requires energy from someone as insignificant as me
 to ask that secure text fields not echo their contents in Plaintext.

I guess its no big deal when you think of the naive device use case - where
someone could simply watch your fingers type on the virtual keyboard ...
but demos are often on mirrored devices or sometimes use hardware keyboards
or are fired up the simulator and displayed on the big screen as the team
watches in earnest to see the week's progress.

Again, I'm OK with it. I like writing custom controls. Just find it
interesting ... there has to be _some_ reason we haven't uncovered yet :)
Wanted to see if anyone had an elegant solution or if I'd missed something
in the API.





On Wed, Mar 5, 2014 at 2:52 PM, Fritz Anderson wrote:

> On 5 Mar 2014, at 1:17 PM, Luther Baker  wrote:
>
> > I'm generally a big fan of Cocoa Touch - but why does the "secure" option
> > on a UITextField still display the character you are typing?
>
> Touch keyboards offer almost no user feedback compared to physical ones.
> The keys on the iPhone keyboard are, to my thinking, too small to operate
> reliably. My hands are on the clumsy side of normal, and my error rate on
> the iPhone is about 10-20%. Left blind, there's no way I could ever enter a
> correct password.
>
> > And, is there any way I can turn this off?
>
> I'd be surprised. iOS meets the (low-level, but nontrivial) security
> standards of a number of governments, and if I owned UITextInputField, the
> fewer hooks into password security, the better.
>
> At least, I don't see any such hook in the API. File a radar.
>
> > Its generally hard to get non-employee AD credentials created or to stand
> > up DEV Active Directory services ... so everywhere I've ever worked,
> folks
> > like me are always entering their real AD creds in the app during
> > development. This is embarrassing when you are pairing and even worse,
> was
> > in a demo today and the leader is asking everyone "not to look" while
> they
> > entered their AD credentials in front of a whole host of people.
>
> At an institution with HIPAA/FERPA/national-security exposure, exposing
> live credentials to development, much less demos, is a felony waiting to
> happen. I'm trying to swear off of impugning others' professionalism (and I
> have no reason to impugn yours), but if software development is part of the
> company mission, it's the admin's job to support that mission.
>
> My long-run strategy would be to escalate the matter on my management
> chain. If there is a privacy/security organization, let them know the risks
> of the current situation in the most gruesome terms you can muster.
>
> > I guess one could write something to work around this ...
>
> People have tried to implement text field look-alikes (or heavily hooked
> text fields) that sort-of do what you want, but it's easier said than done.
> It's close to a from-scratch proposition. And, Apple is always going to
> provide a better, more-secure password (or even plain-text) field than you
> can build for yourself. There's more to security than screen appearance.
>
> I understand what you're saying, and I sympathize, but I don't _think_
> Apple is going to make it a priority to help you. Apple will argue that it
> can't assume the user's responsibility to keep live assets off projection
> screens, and to look over his shoulder before entering a password.
>
> The only way to find out is to file a radar and see what comes out in iOS
> 8. In the mean time, yeah, you'll have to use the delegate methods to
> hot-swap bullets for typed characters.
>
> > but does anyone
> > know if that is really necessary - and what would have motivated Apple to
> > implement textField.secureTextEntry this way ... or not provide a
> textField.
> > *really*SecureTextEntry option which would 

Re: secure uitextfield is not secure

2014-03-05 Thread Fritz Anderson
On 5 Mar 2014, at 1:17 PM, Luther Baker  wrote:

> I'm generally a big fan of Cocoa Touch - but why does the "secure" option
> on a UITextField still display the character you are typing?

Touch keyboards offer almost no user feedback compared to physical ones. The 
keys on the iPhone keyboard are, to my thinking, too small to operate reliably. 
My hands are on the clumsy side of normal, and my error rate on the iPhone is 
about 10–20%. Left blind, there’s no way I could ever enter a correct password.

> And, is there any way I can turn this off?

I’d be surprised. iOS meets the (low-level, but nontrivial) security standards 
of a number of governments, and if I owned UITextInputField, the fewer hooks 
into password security, the better.

At least, I don’t see any such hook in the API. File a radar.

> Its generally hard to get non-employee AD credentials created or to stand
> up DEV Active Directory services ... so everywhere I've ever worked, folks
> like me are always entering their real AD creds in the app during
> development. This is embarrassing when you are pairing and even worse, was
> in a demo today and the leader is asking everyone "not to look" while they
> entered their AD credentials in front of a whole host of people.

At an institution with HIPAA/FERPA/national-security exposure, exposing live 
credentials to development, much less demos, is a felony waiting to happen. I’m 
trying to swear off of impugning others’ professionalism (and I have no reason 
to impugn yours), but if software development is part of the company mission, 
it’s the admin’s job to support that mission.

My long-run strategy would be to escalate the matter on my management chain. If 
there is a privacy/security organization, let them know the risks of the 
current situation in the most gruesome terms you can muster.

> I guess one could write something to work around this ...

People have tried to implement text field look-alikes (or heavily hooked text 
fields) that sort-of do what you want, but it’s easier said than done. It’s 
close to a from-scratch proposition. And, Apple is always going to provide a 
better, more-secure password (or even plain-text) field than you can build for 
yourself. There’s more to security than screen appearance. 

I understand what you’re saying, and I sympathize, but I don’t _think_ Apple is 
going to make it a priority to help you. Apple will argue that it can’t assume 
the user’s responsibility to keep live assets off projection screens, and to 
look over his shoulder before entering a password.

The only way to find out is to file a radar and see what comes out in iOS 8. In 
the mean time, yeah, you’ll have to use the delegate methods to hot-swap 
bullets for typed characters.

> but does anyone
> know if that is really necessary - and what would have motivated Apple to
> implement textField.secureTextEntry this way ... or not provide a textField.
> *really*SecureTextEntry option which would mask ALL the characters. Maybe
> an option that doesn't even show how many # the user is actually typing.
> I'm surely not counting 14+ characters anymore.

Anything that encourages people to adopt passwords short enough to survive a 
15% error rate is not secure at all.

— F


___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Eric E. Dolecki
Maybe using a custom font containing nothing but bullets for the secure
UITextField? I don't know if that would work or not.

- Eric


  Google Voice: (508) 656-0622
  Twitter: eric_dolecki  XBoxLive: edolecki  PSN: eric_dolecki


On Wed, Mar 5, 2014 at 2:43 PM, Quincey Morris <
quinceymor...@rivergatesoftware.com> wrote:

> On Mar 5, 2014, at 11:17 , Luther Baker  wrote:
>
> > I'm generally a big fan of Cocoa Touch - but why does the "secure" option
> > on a UITextField still display the character you are typing?
>
> Because (in my own case) I’m incapable of typing a password correctly
> using the on-screen keyboard unless I can see when I’ve pressed the wrong
> key. Seriously.
>
> While there does seem to be good reason for some direct solution in the
> scenario you describe, one alternative is to use a password manager to
> copy/paste in the password instead of typing it. (Of course, you need to
> unlock the password manager privately first.)
>
> ___
>
> Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)
>
> Please do not post admin requests or moderator comments to the list.
> Contact the moderators at cocoa-dev-admins(at)lists.apple.com
>
> Help/Unsubscribe/Update your Subscription:
> https://lists.apple.com/mailman/options/cocoa-dev/edolecki%40gmail.com
>
> This email sent to edole...@gmail.com
>
___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Re: secure uitextfield is not secure

2014-03-05 Thread Quincey Morris
On Mar 5, 2014, at 11:17 , Luther Baker  wrote:

> I'm generally a big fan of Cocoa Touch - but why does the "secure" option
> on a UITextField still display the character you are typing?

Because (in my own case) I’m incapable of typing a password correctly using the 
on-screen keyboard unless I can see when I’ve pressed the wrong key. Seriously.

While there does seem to be good reason for some direct solution in the 
scenario you describe, one alternative is to use a password manager to 
copy/paste in the password instead of typing it. (Of course, you need to unlock 
the password manager privately first.)

___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

secure uitextfield is not secure

2014-03-05 Thread Luther Baker
I'm generally a big fan of Cocoa Touch - but why does the "secure" option
on a UITextField still display the character you are typing?

And, is there any way I can turn this off?

Its generally hard to get non-employee AD credentials created or to stand
up DEV Active Directory services ... so everywhere I've ever worked, folks
like me are always entering their real AD creds in the app during
development. This is embarrassing when you are pairing and even worse, was
in a demo today and the leader is asking everyone "not to look" while they
entered their AD credentials in front of a whole host of people.

I guess one could write something to work around this ... but does anyone
know if that is really necessary - and what would have motivated Apple to
implement textField.secureTextEntry this way ... or not provide a textField.
*really*SecureTextEntry option which would mask ALL the characters. Maybe
an option that doesn't even show how many # the user is actually typing.
I'm surely not counting 14+ characters anymore.

-Luther
___

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com