Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Child-Suitable Alternatives To Passwords? 895

An anonymous reader writes "Two months ago I donated my old PC to my little sister, who is 7 — I had promised she would get her own computer as soon as she can read and write properly. I then proceeded to answer her questions about how it works, as far as she inquired, and tried to let her make some choices when installing Debian (she can already use GNOME). As I explained password protection and encryption to her, I was pleasantly surprised when she insisted on protection measures being as strong as possible, so that no one else can screw with her computer. She knows that my younger brother has to endure strict parental control software that was installed on his machine without his consent. The significant problem is that she cannot permanently memorize abstract passwords, even if they are her own creation. I talked with a teacher who assured me that this is common at her age. My parents would probably be able to guess non-abstract passwords. What mechanism of identifying herself does the Slashdot crowd suggest?"
This discussion has been archived. No new comments can be posted.

Child-Suitable Alternatives To Passwords?

Comments Filter:
  • Pictures (Score:4, Interesting)

    by Aliencow ( 653119 ) on Friday February 22, 2008 @12:50PM (#22516116) Homepage Journal
    I guess picking the right pictures in a list in the proper order would be a good idea....I think I saw something like that posted on slashdot in the last year.
  • Strange quote... (Score:5, Interesting)

    by Foolicious ( 895952 ) on Friday February 22, 2008 @12:52PM (#22516160)

    My parents would probably be able to guess non-abstract passwords.
    I find this interesting. Is the goal to set up a machine for a 7-year-old that parents cannot access? If so, I personally think this is silly. I do admit I RTFS very quickly and perhaps missed something.
  • Use a USB key (Score:1, Interesting)

    by Anonymous Coward on Friday February 22, 2008 @12:55PM (#22516256)
    Create a random key file on a USB key and set up linux to use the key file as the decryption key for the hard drive. That way, she won't have to remember a password.
  • how irresponsible (Score:2, Interesting)

    by tfiedler ( 732589 ) on Friday February 22, 2008 @01:00PM (#22516392)
    So basically you want to subvert the ability of your parents' to exert their moral and legal responsibility to raise their daughter by allowing a 7 year old child, one who is not capable of something so requisite as remembering a significantly complex password? Your little sister has no business having unfettered access and control over her computer, and consequently, her online experience. You are irresponsible, probably due to considerably immaturity, and should refrain from interferring with your parents' raising their daughter.
  • out of curiosity... (Score:2, Interesting)

    by Harin_Teb ( 1005123 ) on Friday February 22, 2008 @01:01PM (#22516410)
    What parental control software IS there for Debian?

    one of the main reasons I haven't switched to Linux is the (at least percieved) lack of parental control software...
  • Easy, use a pattern (Score:4, Interesting)

    by JoeShmoe ( 90109 ) <askjoeshmoe@hotmail.com> on Friday February 22, 2008 @01:01PM (#22516416)

    I would say the majority of non-computer users have trouble remembering really strong passwords (ones that make use of a mixture of letters and numbers and punctuation marks). I find the solution is to rely on muscle memory.

    Pick a column on the keyboard and press every key along that line. For example 4rfv. Now hold down the shift key and repeat it. $RFV. So the password is 4rfv$RFV which is relatively strong for most uses but is a snap and simple to remember.

    The only caveat is that it's not a password that you can type while someone is watching but then...really nobody should be watching when you type any password. Although, pressing the shift key can be pretty subtle.

    Other patterns like squares or crosses work as well.

    - JoeShmoe
    .
  • Re:Strange quote... (Score:2, Interesting)

    by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Friday February 22, 2008 @01:10PM (#22516564) Journal
    No, better the sister learns this lesson early:

    Trust is different than trustworthiness. Trustworthiness is a quality, and trust is an action.

    Trusting someone always makes you less secure, no matter how trustworthy they are. It is certainly better to trust someone who is trustworthy, but it is still a decrease in security.
  • Misplaced Loyalty (Score:2, Interesting)

    by Anonymous Coward on Friday February 22, 2008 @01:12PM (#22516600)
    "...I was pleasantly surprised when she insisted on protection measures being as strong as possible, so that no one else can screw with her computer. She knows that my younger brother has to endure strict parental control software that was installed on his machine without his consent."

    This has me a little baffled, but probably for lack of context. I'll assume that formal legal gaurdians or parents are the agents initiating the installation of the parental control software. If not, ignore the rest.

    The concern seems to be that a 7 year old girl should be able to successfully thwart any attempt to protect her by the "screwing" of her computer in spite of what might be a legitimate act by those charged with her care to protect her as a child. If she were 18 (maybe even 16), that's one thing, but taking direct action to eliminate protective policies over a young child from someone who is clearly not the parent or guardian steps over a number of lines, both legal and ethical.

    Whether or not you agree with "strict" policies that govern a child that is not your own, it just isn't your decision to make. The fact that it is a computer makes no relevant difference.

    Maybe the conversation would more appropriately be with those that are liable and charged with her care rather than trying to subvert it.
  • Re:Shape (Score:3, Interesting)

    by coldcell ( 714061 ) on Friday February 22, 2008 @01:17PM (#22516688) Homepage Journal
    This method of remembering a password as a rhythmic/spatial pattern rather than an actual representation of symbols helped me easily create and recall huge passphrases, complete with non-alphanumeric characters. It probably helped that I'm naturally inclined to tap out rhythms with my fingers anyway, but I could see a 7 year old being taught a secure passphrase this way (much like learning a piano melody).

    Of course, I ran into the main problem with this the day my keyboard broke; I went and got a cheap replacement, plugged it in, and couldn't "play" my password properly.

  • Re:None (Score:2, Interesting)

    by Hatta ( 162192 ) on Friday February 22, 2008 @01:23PM (#22516812) Journal
    Why shouldn't she? Are the 1s and 0s going to hop out of the computer and bludgeon her to death?
  • Easy. (Score:3, Interesting)

    by jellomizer ( 103300 ) * on Friday February 22, 2008 @01:25PM (#22516832)
    All you need is the following.
    A seporate USB Keyboard a numberpad extenstion can work
    A Lathe.
    A Wooden Dowle.
    A wooden box or sheet metal.
    A drill with a bit the same size as the dowel.

    Ok take apart the USB Number Pad rewire it so all the keys are in a straight line.
    Take the woden dowle on the lathe and cut impressions for all the keys.
    Cut out different sections from the lathed dowle so when spun over they keyboard it presses the keys in a unique fassion. Put the modified keyboard in the box and drill a hole in it just above the keyboard for her to put the Dowle key in. and hook it up to the computer. And have her keep the key. That whay when it asks for a password she just needs to put the key in and turn it. And it will type the password.

    This may sound a bit extream but the instructions are easer then say getting Ubentu to Run in Parallels.
  • Who said anything about the internet? He only said it's a box running Debian... it might not even have an ethernet cable attached to it. Maybe she just wants to keep her Carmen Sandiego games protected from everybody else.

    I mentioned it in an earlier post that this is an age where children are learning about control and ownership - secret passwords to let people into their "fort", a lockbox for their "precious jewels" with a key that only they have... sibling rivalry can be a big deal, and kids need their space, whether it's a room or a computer.
  • Re:Pictures (Score:3, Interesting)

    by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Friday February 22, 2008 @02:07PM (#22517604) Homepage
    18? Hell, you can have a child of your own and get married at 16.

    You need to revise your scales a bit. I'd say by the time they're old enough to want privacy they're old enough to need it.. 11 or 12 maybe.

    Or would you also routinely read your childs diary until they're 18?
  • by penguin_dance ( 536599 ) on Friday February 22, 2008 @02:46PM (#22518312)

    And after they're 18, you don't get regular phone calls or visits, nor talks about their lives. You'll have denied them privacy for as long as it was legally possible for you to force that upon them, and the pendulum will swing back in full force, reacting to your actions with equal force in the opposite direction.

    Maybe...until they have their own kids. But mostly that's crap. Children expect boundries...and they will keep pushing you until you establish some. Because, when there's no barriers, there's also nothing protecting you either. They may grouse at the time, but they will respect reasonable restrictions.

    Boundries are the foundation that allows the now 16 year-old daughter to tell her boyfriend, "We can go in my room, but mom/dad will freak if I close the door."

    I've got to wonder what this precocious 7 year-old wants to look at or do that she thinks is going to be foiled by her parents!

  • by sumdumass ( 711423 ) on Friday February 22, 2008 @03:07PM (#22518706) Journal
    Bull shit. Children don't posses the ability to accurately reason. This is one reason why the age of consent is 18 in most places. Sure, some children mature faster then others and some think they have but it doesn't apply universally to them.

    If you ask people 20 years after their teens, they will most likely say they didn't know as much as they thought they knew at that time. Most kids find a point in their teens when they think they know it all. Later they realize that if they knew what they know now, back then, they would have done quite a few things different.

    It sounds like you can't make a definitive statement on your parents snooping either. IF you as you claim, didn't do anything wrong, how would you know that Dad was looking at your browsing history or cookies? He wouldn't tell you because you did nothing he objected to. He could have been reading your email and all and you just turned out to be a good kid regardless. Again, you wouldn't know unless you did something wrong that he felt like dealing with. And even then, he might have dealt with it in an unrelated way so you wouldn't put two and two together. After all, why expose the ways he found out about what you were doing that was "bad" and lose that ability in the future?

    The primary role of a parent is to make you into the best person you can be and give you the opportunity to do this within their means. This might be subject to interpretation but it would require them to know something about you. Just because you couldn't catch them checking up on you doesn't mean they didn't from time to time.
  • by richpoore ( 925284 ) on Friday February 22, 2008 @03:11PM (#22518778)
    Abuse is the one area a child does need help overstepping their parents. However, if the child is being abused, you should be going to the authorities or someone who can help with that. If the parents are looking out to protect her, which it sounds like that's maybe the case, then they should know what a 7 year old is doing. I noticed a point of if the computer isn't connected to the network then maybe there less need for protection but if there's no abuse and she's still under her parent's authority, what is the problem?
  • Re:Pictures (Score:4, Interesting)

    by bendodge ( 998616 ) <bendodge AT bsgprogrammers DOT com> on Friday February 22, 2008 @03:19PM (#22518922) Homepage Journal
    Why does a parent having absolute authority imply no freedom? I highly doubt you've raised any children (at least, the kind that can keep out of jail).
  • Re:Pictures (Score:4, Interesting)

    by encoderer ( 1060616 ) on Friday February 22, 2008 @04:03PM (#22519516)
    Exactly.

    I had "root" access to each of my computers as a child. The first was handed down to me from my dad when I was 9 or so and it was exclusively my toy, kept in my bedroom.

    Of course, this was 1992, and it was an IBM XT (and later a PS2, err.. an *IBM* PS2). Aside from word processing and the few games that worked on a monochrome monitor there wasn't much you could do with it.

    Now-a-days?

    No way.

    I cautioned my parents not to let my THIRTEEN y/o sister have a PC in her bedroom, let alone a seven year old!

    Can anybody here think of ONE good reason for a 2nd grader to have privacy like this?
  • by Blkdeath ( 530393 ) on Friday February 22, 2008 @04:46PM (#22520108) Homepage

    Oh, I don't know. My daughter is four now, but when she's a teenager, if she's smart enough to both get root and keep me out of it and encrypt all her network traffic more power to her.

    Yes, but does that mean she'll be smart enough to choose not to go meet that really cool girl that's friends with her online?

  • Re:Anonymous Child? (Score:2, Interesting)

    by TourDirector1108 ( 1211234 ) on Friday February 22, 2008 @05:45PM (#22520960)
    Actually, I'm not sure the sister exists. I think what we've got here is a 14 year old boy that wants to foil his parents for something super-secure for his own use, and the innocent little sister is a great tool to use...
  • Try this out: (Score:3, Interesting)

    by Upaut ( 670171 ) on Friday February 22, 2008 @10:14PM (#22523648) Homepage Journal
    I have two solutions if your little ones are paranoid about being spied on. Either give them a knoppix disk and a thumbdrive to keep all their important files with them at all times, or give them total control over their machine...

    Like: http://www.achatz.nl/catalog/product_info.php?cPath=3&products_id=38 [achatz.nl]

    It might not be the best and fastest, but its damn good... Give it enough time, code, and wire, your girl could do most anything.... Build a chip for sd cards for storage... Figuring some way to connect to the world wide web.... It'll be like getting a UGO into the grand prix and winning... And in this case, less is more... You still need to spell, and the most of the memory included is in the users brain... Nothing like building your own machine to give a sense of accomplishment...
  • Re:Pictures (Score:1, Interesting)

    by Anonymous Coward on Saturday February 23, 2008 @12:10AM (#22524292)
    Why do you assume that this machine has internet access? Besides which, a sever on the gateway could block a heck of a lot of nasties and keep logs for you to check. Why would you need root access to the machine then?
  • Re:Pictures (Score:2, Interesting)

    by iwein ( 561027 ) on Saturday February 23, 2008 @10:53AM (#22526646)
    Being a parent myself I would be very happy to have kids smart enough to keep a computer sort of secured against me. The fact that the sister decided to want security on her own makes her old enough by my standards. As a parent I wouldn't be too concerned anyway, I can physically check what my child is doing and if I strongly disagree I still have control over the power supply. Since the computer is used I guess that fancy tech like a fingerprint swipe is out of the question. Maybe you can get voice recognition working? That is pretty hard to crack if you don't let yourself be recorded (same as a password actually ;)). You could also find a way to store the password in a way that your sister is able to decipher. (write it down in the wrong order or something). This is not as secure, but it should work fine as security by obscurity against the average unsuspecting parent.

The moon is made of green cheese. -- John Heywood

Working...