Bruce Schneier Talks Brain Heuristics and Security 83
ancientribe writes "Bruce Schneier is at it again: the security icon shares his latest research and insight on the interplay between psychology and security in this article in Dark Reading. The focus of Schneier's latest research is on brain heuristics and perceptions of security, which may be the basis for the best-selling author's next book. His goal for the topic, which he'll be presenting at the RSA Conference next week, is to focus on how people think, and feel, about security, and how neuroscience can help explain how our perception of risk doesn't always match reality."
Its all in your.. (Score:3, Funny)
Re: (Score:3, Insightful)
A slightly different analogy. (Score:2)
Re:A slightly different analogy. (Score:4, Funny)
Re: (Score:2)
That's assuming they have it. Smart people take Valtrex so they can start sleeping around without using protection while eliminating the risk of a partner giving them herpes in the first place. But of course, the pharmaceutical industry lacks the balls to produce the obvious commercial, an
Re: (Score:2)
Re: (Score:2, Interesting)
The best path is to prevent ill will from forming. That is done by convincing the disenfranchised people that they are cared for.
Re: (Score:1)
KFG
Encryption and ease of use. (Score:5, Insightful)
At one point in the article, Schneier comments on email encryption:
This is a good example, because encryption is in common use on the web. To the end user, using a website over an SSL or TLS connection is no different from using one in the clear. It's almost too easy, which is why browsers have lock icons, color changes, and "You are leaving a secure site!" messages.
Of course, the problem is slightly different, since HTTPS is all about protecting a client-server connection from eavesdropping, not protecting the data itself. Once the data reaches the server, the server is entirely capable of doing something boneheaded with it like saving it in plain text in index.html. Similarly, data sent to the client can easily be printed out and left face up on the car seat.
Client-server connections are easy to deal with, because the only people that need to manage them are the software developers and the admins managing the server. Similarly, it's trivial for an end-user to send/retrieve mail using a TLS-encrypted SMTP, POP3, or IMAP connection.
Email is harder, because it's fundamentally peer-to-peer (layered through a series of client-server interactions), which means the end users actually have to manage a digital identity.
Re:Encryption and ease of use. (Score:4, Interesting)
I have to enter my passphrase before I send something I might regret. This has been a boon to me on innumerable occasions. It means I send fewer emails than I otherwise would, but I don't tend to send anything I'll regret years down the road.
Re: (Score:1)
Re:Encryption and ease of use. (Score:5, Insightful)
That, and email encryption is mostly done either through soft-certificates or - more commonly - through PGP. There are hardly any mail systems that integrate PGP, although they are available as add on. Even so, I believe the user interface is still much harder than e.g. websites with SSL. Also, as you rightly said, end users not only have to manage a digital identify, most of the time they have to handle the other person's digital identities as well. E.g. here at home I cannot verify any signatures that I can verify on the computer at my work, because I do not have an up to date certificate store.
Of course there is also SSL with client side authentication. Although this is very usefull for B2B transactions (web services), you will hardly see any uses for end users. Even though both Mozilla and IE have build in support (although the Mozilla version tended to be broken for a pretty long time, and the IE version also has its fair share of problems).
Re: (Score:2)
I have to disagree with this statement since end users could use a notary to manage this identity. Specifically, I'm thinking of a website that allows users to send and read encrypted messages. One would create an account on the site which would then generate the necessary crptographic keys; the user could then send enc
Re: (Score:1)
I haven't entirely thought this idea through, but I'm not aware of anyone having attempted such a thing.
Hmm, well, I've been in touch with a company in the Netherlands, http://www.nedsecure.nl/ [nedsecure.nl] who offer pretty much what you're suggesting.
Transparant email encryption through a webserver/webmailportal. So you can send encrypted messages to your clients, they get a notification mail, and can check the mail you sent online. Bit cumbersome perhaps, but well, technology probably improved from back in nov-2005 that I saw these guys at some InfoSecurity convention.
Unfortunately, the site seems to be dutch o
Re: (Score:2)
You can use a cryptographic provider [dekart.com] that can store the certificates and the keys on some sort of media (ex: token, smart card or USB drive). When there is a need to use the certificate, the application will ask you to connect your smart card (or whatever it is that you chose to use).
Note: This works with Windows only.
Re: (Score:2)
Re: (Score:2)
All the email clients on my computers are configured to leave the messages on the server for a few days. Once I receive a digitally signed email from a friend, that email will be received by all the computers, therefore the credentials of the other party are available.
And if that doesn't help - the CA should make everyone's data available in a public directory.
MUA makes a big difference. (Score:2)
The environments where I've seen the heaviest use of encryption are Lotus Notes shops, because Notes was basically designed around encryption. Granted, it uses some str
Re: (Score:2)
That _could_ be really easy, though. Just one idea for how to do it: when you configure your mail client, it generates a PGP key pair for you (or allows you to specify one), which it publishes on subkeys.pgp.net. Add a widget somewhere that allows you to select signing, encryption, both, or neither. Now everyone can use PG
Tag !schneider (Score:1)
That word. . . (Score:5, Funny)
Re: (Score:2, Informative)
Really, it's good that you paid attention in high school. You learned a lot of great rules of thumb that will help you avoid making grammatical errors. But they're just rules of thumb. They don
Re: (Score:3, Funny)
Re: (Score:1, Informative)
There are plenty of perfectly good uses for the word 'literally'. I counted 6 when I looked in my dictionary.
The "tweed jackets" (nice flamebait there, by the way. I happen to wear tweed every day) have shown that one of the commonly used meanings for the word is vacuous. To paraphrase Wittgenstein, the meaning of a phrase is in its uses. And this possibly figurative meaning can be perfectly exact. Ergo, a phrase can be meant literally and figuratively at the same time.
Re: (Score:2)
Ergo, a phrase can be meant literally and figuratively at the same time.
Schroedinger's cat[chphrase]?
*whoosh*
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
"The cat was very sleepy" and
"The cat was literally dying to sleep".
Obviously, in the first case, 'very' acts as an intensifier, intensifying
Re: (Score:2)
Wordnet says (and if Princeton isn't good enough for you, then I don't know what else to say):
Re: (Score:1)
Re: (Score:3, Funny)
Re: (Score:2)
* That is 'immovable', not 'repaired'.
Re: (Score:1)
It's just the usual social engineering (Score:2)
Bruce Schneier is my homeboy (Score:5, Funny)
Re: (Score:1)
Perception (Score:5, Interesting)
Part of the problem is with our perception of probability. We see it mathematically, but we still expect cause and effect rather than randomosity. Most users will say things like "why would someone monitor me," not realizing that there's usually no direct causal relation between who they are and interest others might have in their information, and the question is better put, "how probable is it that someone like me might be monitored."
In other words, we feel relatively safe in a crowd. We are completely visible, but because we cannot see why someone would single us out as unique, we feel obfuscated. All the while not realizing that it's more opportunity than it is causality.
This is why we feel safe sharing information on websites like myspace, or using our credit cards over insecure wireless connections, because we believe that because everyone else is engaging in this fundamentally insecure behavior, we have safety in numbers. No one will read our blog for information about our identity, no one will try to use our amazon account to buy electronics.
But they will, with a probabilistically determined frequency.
Re: (Score:3, Insightful)
Take the risk of getting wiped out by an asteroid vs. the risk of getting framed and sent to prison. The former is far less likely (less than 1 in a million), but it also gets people a lot more scared. Your odds of being framed and sent to prison are greater than 1 in a 100 over a lifetime (at least in the USA, the odds are far lower in countries with lower incarceration rates), b
Re: (Score:1)
That's a rather extraordinary claim. Do you have extraordinary evidence to back it up with? [overcomingbias.com]
Re: (Score:1)
Re: (Score:2)
Your odds vary greatly based on where you are, how rich you are, your gender, your race, your political connections, and other factors, with poor black males in inner cities
Re: (Score:1)
Where on earth do you live? Los Angeles?
In any case, that is certainly not true around here. In small-town Ohio, I doubt if 1% of the population, nevermind 10%, has ever done time in prison. I believe 10% is higher than the proportion who have been inside a prison even to visit. I do know a guy who *works* at a prison, and I know several men who have been into prisons at one time or another as part of a ministry... but
Re: (Score:2)
Re: (Score:1)
Oh. I'm sorry. I didn't mean to be insensitive.
Good points, poor example though. (Score:2)
But that's still a poor example, because that's a controllable risk. People don't get as upset about it as they do plane crashes or terrorism, because they feel like they have some level of control over the outcome. "W
Re: (Score:3, Informative)
And the perception still gets it wrong if two risks are very similar: Think about the craze because of the H5N1 bird flu. Worldwide we have now ~200 people w
Re: (Score:2)
Shhh! If word gets out, the government might spend trillions of dollars in a War On Fish...
Not just knowing the imbalance is there... (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Do you perchance also have an insightful explanation of why we should be _worried_ about Them monitoring us?
5 tough user-space factors (Score:5, Insightful)
1. Incentives: Most people, especially employees, don't face personal consequences when their PC is infected or the company database gets pwned.
2. Rarity: Most people see security problems as something that happens to someone else. That so few breaches are publicized only enhances the belief in the low likelihood of problems.
3. Hubris: Most people believe they know what they are doing.
4. Boredom: Ask a person to be careful too many times in the face of a relatively low-probability event and they become trained to click "Yes, Install."
5. Sociality: Most people are nice and assume that other people are nice too. They hold the door open for the social engineering intruder, they click on the "cool link", they open email that looks like it might be from someone important. Malware creators prey on our desire to "do the right thing."
Some of these five are easier to address but some reflect deeper realities about being human.
You mean, Bullshit in Bullshit out. (Score:1, Troll)
Some of these five are easier to address but some reflect deeper realities about being human.
And all but one of them have the same solution, Education.
Re: (Score:1)
Half of the security problems we face today are because users don't know who to trust.
Me? I'm only safe because I hate the popular but stupid crap and am far too lazy to even try new software until I've heard something about it from several people I respect and I have some reason to believe it doesn't contain any nasty surprises (i.e. spyware or adware). I'm also so anti-advertising that the one time I saw a p
Re: (Score:1)
6. Difficulty: Security is hard and unintuitive. How many scams--both online and offline--rely on duping people's epistimology? ("Yeah, I'm a cop. Call this number on the back of my badge to verify.") We're really quite bad at it, and even worse: computers make it especially difficult to tell where a piece of data is really coming from. Did that urgent security pop-up come from Windows, or is it just a GIF on the current website? You an
Re: (Score:1)
"Old news" (Score:1, Funny)
When one of the reporters asked for a copy of Mr. Schneier's notes during the presentation, he handed her two pages of ciphertext.
Re: (Score:2)
The poor photographer nodded meekly.
True story.
OT (your sig) (Score:1)
Wouldn't that be, "In Soviet Russia, your country ask not what it can do for you!"?
fear and power (Score:3, Interesting)
It was interesting how Schneider said "you can feel secure even if you're not" - maybe this is also known as herd-mentality..
Re: (Score:1)
Hopefully you haven't been reading Niven.
Re: (Score:1)
In a home setting, breaking the glass will make a significant racket. That's not good protection (except insofar as it makes your case with the insurance company more straightforward) against theft that occurs while you're away on vacation for three weeks, or even at work during the day, but it *is* useful against petty break-ins when you sleep at night. Indeed, if the thief is thinking (which, granted, is not always the case) he would probably pick a lo
Re: (Score:1)
Re: (Score:1)
Oh.
To be perfectly honest, we practically never lock the doors at my house, and I do feel safe. Not that I am not aware of various possible crimes which potentially could be committed -- on the contrary, I am fully aware that those things could happen, or for that matter that the house could burn down, or any number of other dire potentialities. Nonetheless, I feel safe. Nothing has ever happened to m
Re: (Score:1)
People TRUST programs with a LOCK as their icon (Score:1)
Re: (Score:2, Insightful)
> than a simple linux command, where you know what is going on?
Because end users *don't* know what's going on.
It's not a question of trusting something complex and inscrutable (proprietary security software) versus something simple and straightforward (open-source command-line software), but more a case of trusting something complex and inscrutable that looks well put-together and comes from a well-known maker, versus something
The New Science of Change (Score:2, Informative)
Primate psychology (Score:2)
Chimps are afraid of each other. So any time any chimp does anything, it's automatically fear time for everyone else.
As I've said many times before, humans work like this: "If you're right, I'm wrong. And if I'm wrong, I'm dead - and that can't be allowed. So I'm right and you're wrong. And if necessary, you're dead."
It's that simple.