text
stringlengths 0
118
|
---|
commercial |
stated. |
“Guaranteed!”33 |
What was this miracle product? What new technology did it employ to |
help people remember passwords? In fact, it was just an empty notebook for |
people to write down their passwords. |
The Password Minder was so mocked that eventually it was “laughed |
out of production.”34 But other similar products remain on the market. |
There’s one called I Love My Password Book! We suggest an alternative |
title: Fraudsters, Here Are All My Passwords for You in One Easy-to- |
Recognize Book. |
One of these types of books, The Personal Internet Address & Password |
Log Book, was at one point ranked #428 out of all books on Amazon, and |
was the bestselling book in Amazon’s Internet and Telecommunications |
category.35 To our dismay, it has done far better than any of our books. |
Maybe it’s time to publish a password keeper book of our own. |
These password notebooks are quite humorous, but critics should be |
laughing at themselves too. With passwords, we demand the impossible of |
people, and then we blame them when they fail.36 It’s quite understandable |
why someone would feel the need to write all their passwords down in one |
book. It is safer than some alternatives. |
The more challenging it becomes to memorize all the passwords, the |
more likely people are to write the passwords down in convenient locations, |
thus creating additional security risks. Passwords find their way onto sticky |
notes near computers or in wallets or in emails or listed in text files in |
devices. |
Impossible demands are being made on human cognition. Yet |
policymakers remain in denial. This isn’t a problem that education can |
solve. People can certainly learn good password practices, but they lack the |
ability to implement them. |
Suppose a person uses only long, complex, or unique passwords and can |
remember them all naturally or with the help of a password service. Is the |
user safe? |
Nope. Fraudsters will just trick users into giving away their passwords. |
Even the person with the world’s longest and most complex password will |
be defeated if they give their password to a phisher. Often, fake websites |
and deceptive hyperlinks look very real and easily deceive many users. |
Figure 8.2 |
Even when users act perfectly in adopting complex, unique passwords |
and avoid accidental disclosure, malware can still compromise username |
and password credentials.37 |
The Problem with Password Recovery Questions |
Password recovery questions are those questions that you set up in case you |
forget your password. Common questions are: |
In what city were you born? |
What is your mother’s maiden name? |
Where did you go to high school? |
One problem with these questions is that the answers are sometimes leaked |
in security breaches. Another problem is that these answers don’t change. |
Furthermore, these answers are easy for hackers to guess. You can create |
the world’s best password, but a hacker can reset your password by using |
the recovery questions. Information such as mother’s maiden name and the |
city of your birth are commonly available in public records. Other |
information, such as the name or a pet or a high school can be readily |
figured out by looking at social media profiles or Twitter feeds. |
One company used a very clever approach to password recovery |
questions, asking some rather odd questions.38 Our favorites include: |
What is the favorite road on which you most like to travel? |
What is your biggest pet peeve? |
If you could be a character out of any novel, who would you be? |
Who was your least favorite boss? |
What was your childhood phone number? |
What is the name of your least favorite teacher? |
Where do you want to retire? |
What is your dream car? |
Where were you New Year’s 2000? |
What is the name of your most memorable stuffed animal? |
Some of the questions seem like they are better suited for a psychological |
profile test. |
Imagine what would happen if this company had a breach and leaked the |
answers. I’m sure hundreds of thousands of bosses will be none too pleased |
to learn that they are a least favorite boss. |
Although we admire the effort, there’s still a problem with these |
unconventional questions—they are difficult for people to remember. Many |
years later, are you going to remember where you wanted to retire when |
you answered your recovery questions? Or your dream car? Recovery |
questions must be easy to remember—easier than one’s password—because |
the questions are designed to help people who forgot their password. |
One strategy discussed is to answer the security questions with lies. But |
it is easy to forget the lies. So, there’s a dilemma—easy-to-remember |
questions that might readily be guessed by hackers, or more obscure |
questions or wrong answers that might readily be forgotten. |
It’s not as though killing the password entirely would solve our |
problems. Password systems have proven remarkably resilient, and the |
alternatives have their own issues.39 The key for policymakers is to stay |
constantly mindful of the costs that data security rules will impose on the |
people that use these systems. Advising people to be more careful is all well |
and good, but people are bombarded with advice about countless things |
throughout their day. |
Security researcher Cormac Herley has argued that people rationally |
reject most security advice and prompts, because, in essence, the juice isn’t |
worth the squeeze.40 People don’t see the immediate benefit of security |
measures but definitely feel their daily burden. If there is a harm to be |
suffered from poor security, the odds are that it will be borne by someone |
else. This makes designing beneficial security advice very hard.41 |
Ultimately, for effective data security, we must avoid asking people to do |
things they can’t do. We also shouldn’t expect success if we merely ask |
people to do things that they are highly unmotivated to do. We must find a |
way to motivate people, as experience has shown that merely barking out |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.