Banks Begin To Use RSA Keys 208
jnguy writes "According to the New York Times (free bacon required), banks are begining to look into using RSA keys for security. AOL has already begun offering its customers RSA keys at a premium price. Is this the future of security, and is it secure enough? How long before everyone needs to carry around 5 different RSA keys just to perform daily task?"
Heh? This is old news (Score:5, Informative)
Re:Heh? This is old news (Score:3, Informative)
HBCI and GnuCash (Score:2, Informative)
German banks use DES and RSA keys on chipcards for years. Together, they developed the Homebanking Computer Interface (HBCI) and the FinTS - Financial Transaction Services: http://www.hbci-zka.de/english/index.htm/ [hbci-zka.de]
It works like a charm with http://www.gnucash.org/ [gnucash.org]. I just insert my chipcard into my reader and can do as many transactions as I want without the hassle of PIN/TAN crap and have a fully working financial solution for my everyday need.
Re:Heh? This is old news (Score:3, Informative)
Banks are the problem (Score:3, Interesting)
Re:Banks are the problem (Score:5, Informative)
Now, understand that banks will use your information any way they can in-house, manipulate numbers and deposit totals and anything else analytical so they can sell a credit card or a loan (its called cross-selling). But what they cannot do is give your information to other 3rd parties without your direct consent unless its under federal mandate and/or decree (read: court order and/or the Patriot act).
Now this is all fine and good, but when you do something substantial with your money and/or your financial outlook (say, investing or buying a home), you open up yourself to offers from 3rd parties. You sign a document saying so.
Now the easiest thing is, before you sign something, ask them which companies are going to be behind this new venture. Whether it be an investing house (a lot of banks will farm out investing to a subsidiary and get kickbacks on it) or mortgages (who owns this loan? Can they sell it to a 3rd party mortgage company at a later date?), you need to simply be aware.
Feel free to google "Bank Privacy" and read up on the hometown banks and the big boys: They all pretty much say the same thing. If they are under FDIC (for banks) or NCUA (for credit unions), they all fall under the same guidelines: Your information cannot be shared unless you say so. The federal privacy statements which are mandatory to be handed out upon opening an account, etc, say the same thing.
Offshore data management services is simply a scarier way of saying Disaster Recovery. You want your bank to keep running even if the home office (or data center) explodes, right? Then don't start bitching about them backing up data in different places.
Re:Banks are the problem (Score:3, Interesting)
Re:Banks are the problem (Score:4, Informative)
The thing is, every 3 months or so they send a new copy of the (slightly modified) privacy agreement and if you don't send them another letter saying don't share my info, they consider it acceptance of the 'new' policy.
HEY DIMWITS (Score:2)
Can we please not use "FUD" to describe anything that happens to be untrue? It is an acronym and as such it actually stands for something. Thanks.
Re:Banks are the problem (Score:2)
Really? How do credit rating agencies get information about your credit card debt without you ever having explicitly told your bank the information is theirs to share? Where exactly do all those pre-approved credit offers come from?
Offshore data management services is simply a scarier way of saying Disaster Recovery. Y
Re:Banks are the problem (Score:2)
Article not about "RSA Keys" -- Hardware tokens (Score:5, Informative)
What did you expect? (Score:4, Funny)
You must be new here.
Re:Article not about "RSA Keys" -- Hardware tokens (Score:5, Informative)
Thumb drives (Score:4, Interesting)
Re:Thumb drives (Score:3, Informative)
Re:Thumb drives (Score:4, Interesting)
Although the article talks about a different technology, one of the core features of the technology you are talking about is that the computer does not, in fact, need to be trusted.
Basically, the computer asks the hardware device to encrypt or decrypt some data. The device stores the key internally and never reveals it.
It is a core concept of devices such as this that it is impossible to retrieve the key. The chips are designed such that they never reveal the key through the "official" interface (the encode/decode thing), and they're made so that taking the chip apart destroys the key.
Re:Thumb drives (Score:5, Insightful)
For example, imagine paying for some goods with one of these devices vs. credit card or smart card...
Smart card: You must trust that the card reader will not choose to use your card to sign things you didn't agree to. The reader could, for example, overcharge you, and you would have no way to know that it did until you checked your monthly statement. (And, hey, by that time, do you even remember if that item was $59 or $69?) For that matter, the reader could very easily make the charge under a different name, making it difficult to determine who committed the fraud.
Credit card: In addition to the smart card caveats, you must trust that the entity reading your card will not distribute your credit card number to any entity whom you don't trust at any time in the future. For that matter, if you use the same credit card with multiple entities, you have no way of knowing which one leaked your number. How can you fight back? Who do you charge with fraud or neglegence? In most cases you just let them go and your credit card company covers the illegal charges, while the FBI spends massive amounts of resources in mostly fruitless efforts to track them down. Why do we use these things?
The device I described: The LCD screen displays the question "Authorize payment of $59 to Acme Co.? Yes/No". No charge can go through without your device approving it. You only need to trust that your device will ask you to confirm any charge. And you can trust it because the manufacturer knows that if it screws up, they'll get their pants sued off.
The only thing that could make it more secure would be to implant the device into your body so that people can't steal it. Though, it's probably better to just deal with having to revoke a cert once in awhile rather than have people cutting you open to get to your bank account.
Re:Smart Card with LCD? (Score:2)
One silly example I think
Re:Smart Card with LCD? (Score:2)
Um, you mean the ID *you created*? And what prevents you from having multiple identities if you create them? Though I see some potential here, but some would have to hand out your ID, not self generate it. It's a series of trust relationships, and I know I don't trust you not to create 100 IDs and vo
Re:Thumb drives (Score:2)
This is news? (Score:5, Informative)
Is this somehow different?
Oh, and by the way, works like a charm and I feel a lot more secure than I do with static passwords
Yes, it IS different... (Score:5, Interesting)
Sounds like your device just calculates a response based on two inputs; don't know why that wouldn't be just as easy in software. (You _can't_ turn a SecureID card off, so it can't get out of synch with the server, unlike software.)
Not to say that your device isn't secure - more reverse engineering would be required to determine that - but the two approaches *are* very different.
Re:Yes, it IS different... (Score:5, Interesting)
Sounds like your device just calculates a response based on two inputs; don't know why that wouldn't be just as easy in software. (You _can't_ turn a SecureID card off, so it can't get out of synch with the server, unlike software.)
Not to say that your device isn't secure - more reverse engineering would be required to determine that - but the two approaches *are* very different.
The approaches are different mostly in the way that securID can't do challenge/response. Note that most hardware tokens that can do challenge/response also use a hardware clock.
The immideately obvious benefit of challenge/response is that it offers far better protection against replay attacks - securID numbers are valid for 10 seconds, whereas a parallel login session using C/R will use a different challenge (in fact, the resolution is worse than 10 seconds since the server will usually accept the previous and next number as well, in order to resync to correct for clock drift).
Also, some e-banking authentication schemes require you to enter both a challenge AND the amount (or recipient's bankaccountnumber) you're transferring; this prevents malware on your PC (or a man-in-the-middle) altering the amount without you detecting it. This is obviously impossible to do with a non-C/R scheme like SecurID.
Example; when I add an account number to my e-banking site's address book, I'm asked for the response to a challenge that's clearly and human-readably derived from the bankaccount# (1 number is dropped) - so malware can't change the acount#s I add to my address book.
In my mind, even devices without a hardware clock that can do C/R are preferable to securID schemes that do have a clock but no C/R.
Also note that tokens that do C/R usually need to be unlocked with a PIN before use (they already come with a keypad, so why not?) - this means you get two-factor authentication basically for free, and the PIN only needs to be checked by the token itself, so it's not stored on the server, not even in a hashed form (which is trivial to brute force for 4/5 digit codes anyway).
While securID might be very well accepted in the IT world, and is easy to roll out, it's certainly not the most secure or well thought-out authentication method by a long shot. And they're damn expensive given how simple their design is! Just a clock and an LCD that shows the hash of the current_date/time_rounded_to_the_closest_10_secon
Re:Yes, it IS different... (Score:4, Interesting)
There are still man-in-the-middle vulnerabilities, but no worse than with a challenge-response
Re:Yes, it IS different... (Score:2, Informative)
A CR system can take multiple inputs (one of which could be a hash of your transaction data)
making the response unique to the transaction.
SecurID uses a simple token that is not unique to the transaction and so is very vulnerable to man-in-the-middle attacks.
Re:Yes, it IS different... (Score:4, Interesting)
Note that I never claimed that it was the most *secure* solution, and yes, the lack of challenge/response does limit it's usefulness.
However, if I can reverse engineer the bank's device and discover the algorithm in use, it becomes worse than useless, in that instills a false sense of security.
Strong passwords are still less hassle, don't sacrifice much to security concerns (if never expressed in clear text), and just aren't that freaking hard to create. Pre-shared keys are even better, depending on how strong they are, and how they're distributed. And how well keys are guarded/revoked-if-stolen.
Re:Yes, it IS different... (Score:2)
Only if you have the seed/key which is used. It's not like I've ever worked with the things, but I would assume that there is a key used to seed the PRNG.
Re:Yes, it IS different... (Score:2)
However, if I can reverse engineer the bank's device and discover the algorithm in use, it becomes worse than useless, in that instills a false sense of security.
No, not if the algorithm is properly designed; it should rely on the secrecy of the key, not the algorithm. And yes, all tokens are keyed, otherwise they would be completely interchangeable, which they're not.
Strong passwords are still less hassle, don't sacrifice much to security concerns (if never expressed in clear text), and just aren't t
Re:Yes, it IS different... (Score:2)
The algorithm was posted to BUGTRAQ [uni-stuttgart.de] in 2000.
SEB uses VASCO SecureID tokens (Score:4, Informative)
The system that the grandparent describes is based on VASCO [vasco.com] "Digipass" devices, that work just like the RSA secureid tokens, only that they also support PINs and challenge/response authentication. That means that if everything is done correctly (which I can't swear to) these tokens, which SEB have been using for more than five years, are considerably more secure than the normal RSA SecureID.
Basically (very simplified) your normal SecureID will create a checksum from a secret and the current time, so the server can verify that person logging in is holding the token at this time. The Digipass, on the other hand, creates a checksum of the secret, the time, and the challenge from the server. This verifies that the person logging in has access to the token at this time, and created a checksum for this particular log in. And the fact that it also requires a personalized PIN to access the device means that stealing it will do you little good.
Re:SEB uses VASCO SecureID tokens (Score:2)
Then again, with the SecurID card, it's even easier.
The only real problem I see is the 'if done right' part. Conceptually it's a better solution than SecurID (no surprise, the market does usually evolve). As far as actual USE goes, it seems a little less convenient.
(Note that I have successfully fought every effort to make me actually _carry_ a Se
Re:Yes, it IS different... (Score:2)
psuedorandom number generator which maps the time uniformly over the keys....that's all. And a sufficiently long seed, of course.
Re:Yes, it IS different... (Score:2)
I can't help but wonder if your device has a battery-backup for the clock, or otherwise how could it be time-synched, if you can turn it off? A possibility that occurs to me is something along the lines of the salt used for many Unix password schemes. The password can be encoded any one of a finite number of ways, re
House keys (Score:5, Insightful)
How long before everyone needs to carry around 5 different RSA keys just to perform daily task?
How long before everyone needs to carry around 5 different physical keys? Let's see... we have the house key, the car key, the shed key, the bike key, the gun case key, the baseball card key...
Re:House keys - forgot one... (Score:3, Funny)
One digital key should be enough (Score:2)
Re:House keys (Score:2)
>> How long before everyone needs to carry around 5 different RSA keys just to perform daily task?
> How long before everyone needs to carry around 5 different physical keys? Let's see... we have the [...] gun case key
Your daily schedule seems to include riding the fences and looking for varmits.
Be careful for that gray rabbit that stands upright, is always chewing on a carrot, and thinks you have a Ph. D. He's a tricky one.
No matter what you do, never ever try to dynamite him.
Re:House keys (Score:2)
As it is now, I have 4 keys -- one for my gate, one for the door to my apartment, and one for my bike lock -- as well as two proximity cards: one to get inside my building, and one to get into work. If these could all be replaced with one R
Re:House keys (Score:2)
Yeah, because everyone wants to live in a world where they can't get into their house if the power goes out during a thunderstorm!
My authenticate authenticate day, 8am - 6pm (Score:5, Interesting)
Wake up. Power on computer, wash up while booting. authenticate with windows. Launch Outlook, authenticate with Exchange server. Hibernate computer. Grab cell phone, wallet, keys, etc.. Leave apartment, authenticate with locks on apartment door. Walk to car, authenticate with car door locks. Get in car. authenticate with ignition. Drive to work. authenticate with cell phone, call voice mail, authenticate with voicemail, hit speakerphone and listen to messages. Lock phone. Park at work, lock car.
authenticate with front door at work. Greet co-workers. Sit down at desk, turn on monitors, authenticate with computer. Launch Outlook, authenticate with Exchange. Call voice mail from work phone, authenticate with voicemail. Listen to messages, hang up.
Terminal Service to Exchange server, authenticate with server. Launch MMC, check event logs, Exchange logs, IIS logs, backup logs. Check performance monitor. Launch Exchange Anti-Virus. authenticate with Anti-Virus program. Check logs. Minimize terminal service session with Exchange server.
Terminal service to SQL server, authenticate with server. Launch MMC, check event logs, SQL logs, IIS logs, backup logs. Check performance monitor. Minimize terminal service session with SQL server.
Launch firefox, browse to sharepoint, authenticate, read messages. Browse to gmail, authenticate, read messages. Browse to online bank, authenticate, check balance. Browse to credit card, authenticate, check balance. Browse to photography community message board, authenticate, check private messages. Browse to Slashdot, authenticate, check headlines.
Get call from manager, talk about project. Browse to file repository, authenticate, download requirements document. Browse to print server, authenticate, print requirements document. Write notes on project, browse to project worksite, authenticate, upload file.
Get call from user, walk user through troubleshooting steps, walk user through remote assistance request steps. Launch messenger, authenticate, receive remote assistance request. Initiate connection with VPN server, authenticate. Launch remote assistance application, connect to remote user, authenticate. Troubleshoot problem. Maximize Exchange server terminal service window. authenticate with locked screen saver. Open MMC, reset user password. Disconnect from remote assistance request.
Browse to network share, authenticate, copy backup files to removable hard disk. Logoff from terminal service sessions and local machine. Grab hard disk and leave office. Lock office door. authenticate with car door, authenticate with ignition, drive home. authenticate with apartment door, turn on computer, authenticate, launch outlook, authenticate with Exchange, read messages. Grab bike and leave house. authenticate with front door. Ride bike to gym. Lock bike in parking lot. Work out. Leave gym, authenticate with bike lock. Ride home. authenticate with mailbox, get mail, lock mailbox. authenticate with front door.
Its now 6:00 and I've authenticated with something or another 40 times. My day is only half over. I carry 8 keys in my pocket, and about 40 different passwords in my head. I am constantly locking and unlocking various things. My case may be a bit more extreme being a system administrator but trust me you do this too, and its probably just as bad. This was just a quick summary, I'm sure I left off about 100 other authentications. Welcome to Earth.
Re:My authenticate authenticate day, 8am - 6pm (Score:2, Interesting)
I would argue that this is authorization, not authentication. Two very different things. The car doesn't care who you are. From the car's viewpoint, you have the key, you are authorized to access the inside of the car.
Old News (Score:3, Informative)
Banks in Poland have been using physical security tokens for online access for a few years. Yawn...
Re:Old News (Score:2)
Re:Old News (Score:2)
No.
The security token looks something like a small calculator. To turn it on, you must enter a PIN. During an online transaction, the web site provides a challenge number (8 digits, I think). You enter the challenge number into the token, and it provides a response (another 8 digit number). You type the response into an edit field on the web form, press "submit" (or whatever), and the transaction completes. Very easy, as long as you don't lose your security token...
Re:Old News (Score:2)
Perhaps the artitle title should have been "U.S. Banks Finally Begin To Use RSA Keys"...
If client can't be trusted, all bets are off! (Score:5, Insightful)
Two ways off the top of my head a phisher can defeat this
1. Grab login data in real-time from an IRC channel, etc and race to login before the code changes - for extra measure, disable the user's connection for a little while - DoS, etc.
2. Proxy the request - that is don't try to steal the login data itself, but rather hijack their session and go to town.
Some may think, ok "check the person's ISP (IP range, etc) too"
In a nutshell, if the client machine can't be trusted, all bets all off!
Yes, tokens raise the bar, but I fear banks will use this more as an excuse to erode consumer protections for fruadulent transactions; Verify by VISA comes to mind.
Ron
Just lock out the account... (Score:2)
I think this is LONG overdue. I hope
just need a physical digit wallet (Score:4, Interesting)
Re:just need a physical digit wallet (Score:2)
It could govern the key to my bak account, should it also govern the
key to say the local video rent store ? Would I trust the local
videostore to also have autority over my bank account ?
Re:just need a physical digit wallet (Score:2)
Not surprised... (Score:4, Interesting)
To answer the 5 tokens keychain question: there is a software token device also available: http://www.rsasecurity.com/node.asp?id=1313/ [rsasecurity.com]
I suppose this doesnt surprise me.. (Score:3, Interesting)
Carry around 5 keys (Score:4, Insightful)
It's not like a million keys are harder to carry around than one...
Re:Carry around 5 keys (Score:3, Insightful)
This is new? (Score:5, Informative)
In fact, most banks are now switching to keypads that you plug your existing bankcard in, so they can piggyback on the tamper-resistant chipcard that's already on there (although it's slightly less advanced than some tokens, since chipcards don't support a clock that's permanently ticking).
Most devices are from Vasco [vasco.com] who provide a wide range of tokens (some more secure than others). They even have challenge/response tokens that don't require you to copy the challenge; they have optical sensors that can read out a code that's blipped out by flashing blocks on your screen. Way cooler devices than those RSA securIDs.
Re:This is new? (Score:2)
Re:This is new? (Score:2)
With C/R the challenge can be extended with human-readable data; my bank required me to enter bank-account numbers I add to my e-banking address book as a challenge in my token. Other banks require the amount
How long (Score:2)
SecurID tokens use AES, not RSA algorithm (Score:3, Informative)
There's no direct relationship between the SecurID tokens sold by RSA and the old RSA algorithm. Actually, the latest generation of SecurID tokens use AES, however RSA still ships backlogs of the older tokens which are built around a proprietary hash.
Like most other response-only tokens, the authentication is based not on large primes like public-key authentication but rather on a shared secret (one embedded in
We should be careful of this.... (Score:2, Interesting)
RSA is based on the idea that prime numbers are very hard to find, and with some of the research that is currentl going into that field I would be very wary of using that idea as an end-all.
If banks are to adopt a universal crypto system, then perhaps AES or some form of elliptic curve crypto
Re:We should be careful of this.... (Score:2)
Re:We should be careful of this.... (Score:2, Informative)
AES was not written in the US - so it is highly unlikely that US banks would adopt it as a first solution. Keep in mind the only US organization (NSA) that can truly say whether or not it is breakable will not say.
Same goes for eliptical curves - they (NSA) will definetly say not all curves are secure - but they will not say which ones and why, but I doubt if you will see elip
Re:We should be careful of this.... (Score:2, Informative)
People have been trying to factor large numbers for a long time, and it's a difficult problem.
Merry Christmas! (or as they say at t
Re:We should be careful of this.... (Score:2)
What the world is coming to? (Score:2)
Argh... please make the distinction (Score:2, Informative)
Customers expected to pay? (Score:5, Insightful)
Therefore, why are customers expected to pay $10 for these? Certainly, banks will recoup the costs somehow (through higher fees in general), but isn't the net effect of this type of technology supposed to be a savings? Isn't it the bank's responsibility (and liability) to make sure their customers' accounts are secure (assuming a reasonable amount of due diligence by said customers)? Isn't the savings in reduced fraud and security breaches supposed to outweigh the cost of the security devices? If not, why does the technology exist?
It sounds great and all, but unless offered as a free service, I'll sit this one out.
Re:Customers expected to pay? (Score:5, Insightful)
Re:Customers expected to pay? (Score:2)
The first is common: make the customer pay for the card, one-time up-front. Most utilities will do this for hook-up charges, etc. as well.
The second method is to include this in day-to-day charges. A lot of people say 'this should be part of the cost of doing business', but look at it this way. Banks aren't going to take money out of their profits to pay for something, they're going to raise your fees.
Security is not free for cheapskates (Score:3, Insightful)
First, the consumer pays for every needed cost by a business. That's a fact just like we all pay when a scammer steals someone's credit card or someone gets into an auto accident and
Sweeden uses a similar token system (Score:3, Interesting)
When she has used about 30/40 the bank send out a new card.
Its a whole lot cheaper than handing out SecureID devices to customers and i'm really suprised that most banks dont have this already, its the size of a credit card and fits nicely in a wallet.
Re:Sweeden uses a similar token system (Score:2, Informative)
Re:Sweeden uses a similar token system (Score:2)
And nothing beats truly random onetime pads
In fact, before any of you start to comment on crypto you should at least have read that book (I know many of you have read it
For CC charges too (Score:3, Insightful)
If they do require charges to a credit card to be authorized by the SecureID card, it not only protects against outright stealing, but also prevents a merchant from saving your CC# and automatically rebilling you without your permission unless you jump thru their hoops to 'cancel' somne service - their only recourse is to terminate the service, which is as it should be.
SecurID (Score:2)
The fob uses time-based encryption against the auth server so that it knows at a given point in time what the 6 digit number should
Frustrating.... (Score:2)
My fear is that each bank would adopt a different technology to implement this, and I would be keeping track of 7 different tokens right now. OTOH, that is not a bad price to pay for better security of my money and lower fees, etc. on my bank accounts.
The reality is that, depite the big inconvenience, US bankin
SecurID vs. Smart Cards (Score:2)
SecurID is just a clunky authentication system using a hardware token to display numbers used for the authentication (although, they do also offer software tokens. there is nothing magical about the hardware)
Why not go to a modern smart card system? It can
Re:SecurID vs. Smart Cards (Score:3, Informative)
A common mistake. Most of the articles [com.com] I've seen lately on the subject have not mentioned either "RSA" or "SecurID", just talking about "devices" or "tokens" or perhaps "two factor authentication".
Re:SecurID vs. Smart Cards (Score:2)
For corporate uses, it's much easier to dictate Smart Cards, and integrate a bunch of different corporate applications - multiplying the benefit of the card.
But, thinking about the problem a bit more.. I guess that cl
"Bloated" security? (Score:3, Interesting)
Biometrics - thumbprints and the like - seem like the best alternative, but the few examples I've used so far have been very finicky, and mostly used as a second layer of authentication with an access card or code.
One thing that is going to make this move quickly is the financial incentive - a few million per month in credit fraud, and some congressman getting ID theft is a pretty strong incentive to be creative.
Re:"Bloated" security? (Score:2)
Mmm... biometrics (Score:2)
Why no open source secure-id implementation? (Score:2)
Open source securid-like tokens. (Score:3, Informative)
The first "open" standard for authentication tokens was part of ANSI X9.9, and was broken (and subsequently retracted [webservertalk.com]) back in 1999. The old X9.9 algorithm is still available as an optional authentication method in several hardware tokens offered by competitors of RSA/SecurID.
Have you looked at GNU SASL [gnu.org] (Simple Authenticat
Re:Why no open source secure-id implementation? (Score:2)
Re:Why no open source secure-id implementation? (Score:2)
better and cheaper solution (Score:2)
OpenPGP (Score:4, Interesting)
I'd like to be able to use just the one key for all the secure sites I go to.
... and I'd like that to be my OpenPGP key.
Surely it must be possible for me to give my public key to a bank (or whatever) and have them authenticate me using that key. e.g. by them sending out a hash, having me sign it using my private key, and then having them check that the signature is good.
Re:For those who don't want to register: (Score:2, Insightful)
Re:For those who don't want to register: (Score:5, Interesting)
http://www.nytimes.com/2004/12/24/technology/24onl ine.html?ex=1261544400&en=7cc80182b7687ad9&ei=5090 &partner=rssuserland [nytimes.com]
(Link created by the NY Times Link Generator: http://nytimes.blogspace.com/genlink [blogspace.com] )
Re:For those who don't want to register: (Score:2)
If VA needs to work with the NYT to get a partnership with VA as Userland has done, then it makes sense
Re:For those who don't want to register: (Score:2)
http://www.bugmenot.com/
That works quite well.
Re:Chinese Supercomputers Crack Normal Passwords (Score:5, Insightful)
The RSA will help to protect Western bank/brokerage accounts from Chinese theft. That the majority of stolen credit card numbers end up in the hands of Chinese gangs, aided and abetted by Beijing, in Southeast Asia should surprise no one."
Nice troll. The fact is that the Chinese, as well as *the rest of the world* have had access to computer technology equivilent to that which exists in the US for *years*. There's nothing new.
Moreover, you don't use a "supercomputer" to crack bank accounts. The fact is, you can't brute force the passwords on bank accounts unless you are able to steal the password hashes - and by then you've already broken the system.
Bank accounts are being stolen using phishing, not supercomputers.
Re:Put up or Shut up (Score:5, Insightful)
I mean, sure, China has openly ripped off numerous technologies from a number of countries to bootstrap their high-tech economy, but to say that our banking industry is in danger specifically from China because they can (holy CPU chip, Batman!) build a Beowulf cluster is sort of ridiculous. China is a significant threat to the Western world, for a variety of reasons, but I'd say banking fraud is probably not one of the biggest ones. I'd be more concerned about Russia or Nigeria.
Re:OT: What happened to searching slashdot? (Score:2)
Re:You don't need multiple tokens!! (Score:4, Interesting)
Each customer will need to provide their seed file to each new back. *IF* banks were able to settle on all using the same technology (RSA/ACE), most certainly all of them would have different policies on pins, etc, rendering it a pretty confusing thing for customers. Don't underestimate the problems that would cause.
Jerry
http://www.syslog.org/ [syslog.org]
Re:5 keys? (Score:2)
Quick! (Score:3, Funny)
Re: Why the mods give points to NYT ripoffs (Score:2)
If you can't see the difference, then I can't help you.....