Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Security IT

NYT Password Security Discussion Overlooks Universal Logins 127

A recent NYT piece explores the never-ending quest for password-based security, to which reader climenole responds with a snippet from ReadWriteWeb that argues it's time to think more seriously about life beyond passwords, at least beyond keeping a long list of individual login/password pairs: "These protective measures don't go very far, according to the New York Times, because hackers can get ahold of passwords with software that remotely tracks keystrokes, or by tricking users into typing them in. The story touches on a range of issues around the problem, but neglects to mention the obvious: the march toward a centralized login for multiple sites."
This discussion has been archived. No new comments can be posted.

NYT Password Security Discussion Overlooks Universal Logins

Comments Filter:
  • by Pojut ( 1027544 ) on Tuesday September 07, 2010 @12:06PM (#33498658) Homepage

    In matters of security, the most important tool anyone can have is common sense. Phishing scams, "dangerous" websites, revealing important information willy nilly...all things that cause major problems in the digital world, and all things that could be almost completely avoided if common sense was more prevalent.

    Granted, some people "don't know any better"...but that's why you educate those types of people if you know any.

  • by $RANDOMLUSER ( 804576 ) on Tuesday September 07, 2010 @12:06PM (#33498666)
    Always a great idea. Windows registry anyone?
  • Torn (Score:5, Insightful)

    by esocid ( 946821 ) on Tuesday September 07, 2010 @12:08PM (#33498674) Journal
    I'll admit, I feel torn when I see that OpenID login. Increase my chance of giving someone access to everything? Or make it simple?
    In the end I compromise and simply use a variation of one password for those.

    There is the problem with centralized logins: the masses don't consider the first part, and only think of the convenience.
  • by Bigjeff5 ( 1143585 ) on Tuesday September 07, 2010 @12:25PM (#33498798)

    Exactly my thoughts.

    Keyloggers still work, phishing scams still work, and social engineering still works. If centralized logins become the norm, the bad folks will simply target the centralized logins.

    Your risk with centralized logins, however, skyrockets. Now, instead of losing control of one login to one website, you lose everything. Moreover, they don't even have to guess what sites you have access to, they can simply dig through the centralized login site and find it once they have your account info.

    The NYT article is interesting, but the SlashDot summary is near useless. There is no need to specifically include universal logins in the discussion, because universal logins suffer from exactly the same issues that individual logins do. The only possible reason for including them is the fact that the potential loss is much much higher with a universal login.

  • by Nursie ( 632944 ) on Tuesday September 07, 2010 @12:26PM (#33498806)

    Well, it doesn't help that companies are ill informed a lot of the time. I got a call today claiming to be from my ISP, asking for feedback on the service. At the end of the call they said they just wanted to verify my identity and asked for my DOB and the answer to my secret question that gets used as a password backup/reset mechanism, so they could confirm they were talking to the right person.

    I told them absolutely not, they phoned me, I only prove my identity with private information when I've phoned a number/service I recognise, not a random caller.

    I'm pretty sure it was them as I got a 'thanks for your feedback' email afterwards, but WTF?
    I'm tempted to think it was some sort of test/survey thing to find out how dumb people are, but that's probably being too generous.

  • by dstar ( 34869 ) on Tuesday September 07, 2010 @12:28PM (#33498816)

    And this solves the keylogger problem how?

    It doesn't. You still have to authenticate at some point; at most, it reduces the opportunities for a keylogger to catch the password (if you only have to type it in every couple of weeks).

    In exchange, it provides phishers with a dream environment. The only way to be certain you're actually connected to your authentication provider is to use SSL and make sure that you see the lock -- and if your security depends on Joe Random User doing that, you've already lost.

    Shalon Wood

  • by tverbeek ( 457094 ) on Tuesday September 07, 2010 @12:32PM (#33498846) Homepage

    Maybe the NYT article doesn't mention centralized login because such an obviously bad idea?

  • by marcuz ( 752480 ) on Tuesday September 07, 2010 @12:37PM (#33498888)
    NY Times knows what they are doing while supporting this call for centralized password management and identity system. They serve the powers that be on their quest to even greater power. I agree with their point - increasing the so called safety - but on the other hand I am a bit worried about having a few people in charge of the identities of eventually entire population. Almighty government and rich corporations will certainly be willing to help us with our identities.
  • by HerculesMO ( 693085 ) on Tuesday September 07, 2010 @12:45PM (#33498940)

    I like OpenID, but if you couple it with a three factor authentication, whether it be a smartcard, or biometric, or whatever.. that's when it becomes useful.

    Too bad the current implementation doesn't support it. Sadly, World of Warcraft and Starcraft II do.

    Go figure.

  • by ADRA ( 37398 ) on Tuesday September 07, 2010 @12:54PM (#33499054)

    Passports, Driver's Licenses, Social Security numbers... yeah the governments just can't be trusted with your identity. Lets trust in Google/Yahoo/Facebook/Microsoft/IBM/etc for our identity needs. Even better, lets have hundreds of incompatible schemes and make user sign up and use them all. That surely has to be more secure than having a single point of failure. I mean look, There's only one ROOT signatory (Verisign) and you just KNOW they fuck up everything they touch, right?

  • by PPH ( 736903 ) on Tuesday September 07, 2010 @01:01PM (#33499140)

    My credit card company (Visa) calls me occasionally about suspicious activity on my card. When they leave a message, the number they leave is NOT the same as the customer service number on the back of my card.

    It's been explained to me that this number gets me to the same place as the customer service number with a few less steps. But I've told them that I'll never call anything other than the number on the card. And that its a really bad idea to train customers to return calls to just any number and expect them to identify themselves with SSNs, relatives names, and provide their card number.

    If anyone is supposed to be smart enough to figure social engineering attacks out, it should be Visa and their ilk.

  • by tick-tock-atona ( 1145909 ) on Tuesday September 07, 2010 @01:14PM (#33499268)

    What has always amazed me about authenication for access-control via a computer is the widespread use of "passwords". We treat computer access-control like it's a brand new problem, however it's really just the same old access-control problem that we solved at least 4000 years ago [wikipedia.org].

    Why don't we have passwords to get into our houses? Why don't we have passwords to get into our cars or P.O. boxes or even safe-deposit boxes? Because passwords are a pain in the ass that are inherently insecure because we, as humans, are terrible at remembering arbitrary strings of numbers/letters/symbols. What we are good at remembering - objects/ideas and the words associated with them - make for terrible passwords because they are so darn easy to guess.

    The idea of a lock and key is one which we have been using for millenia for security, so why haven't we applied this simple metaphor for electronic access-control. We even have the technology readily available: Public Key Authentication. But for some reason the only place I've ever seen it used is in OpenSSH. In fact, it's considered superior to password authentication in OpenSSH and recommended over a password.

    So why not have RSA keys to our email, online banking etc. just like we have keys to our houses, cars etc?

  • I'm listening... (Score:2, Insightful)

    by GoChickenFat ( 743372 ) on Tuesday September 07, 2010 @02:24PM (#33500202)
    So educate me... How do I use common sense to determine if the site I just logged into actually secures the login information on the backend? Is it stored in clear text, transmitted in clear text, available to everyone in the company? I have no idea what happens to the credentials I just entered. How do I use common sense to determine if Facebook, MySpace, Slashdot, NYT, etc are taking the securing of my personal and login information seriously? Do you read every EULA completely? Would you even know if the company did not follow their EULA? Do you have the resources to sue if they don't?

    Common sense tells me that no site is to be trusted implicitly; they are all dangerous.

It's great to be smart 'cause then you know stuff.

Working...