Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ken in texas

I think password leaks are the cause of 99% of hacking. Thus the solution needs to better password schemes.

Here are three possibilities:

1. Require two or more different passwords to be entered by two or more different designated people.

2. Have a delay of some amount of time before the password is accepted, and notify designated individuals during the delay period that entry has been requested and by whom.

3. Allow password entry only at certain times. I think bank vaults aren’t openable except at a certain time each day.


7 posted on 06/09/2021 6:55:19 AM PDT by cymbeline
[ Post Reply | Private Reply | To 1 | View Replies ]


To: cymbeline

I work in IT and I have to manage at least 40 passwords each on a different change schedule . So many passwords that I have to manage the in a password protected spreadsheet.

I would say that at least 20% of my day is putting in a damned system password. I would get no work done if I had to wait for a second person to sign in for everything I did.


12 posted on 06/09/2021 7:12:51 AM PDT by wildcard_redneck ( COVID lockdowns are the Establishment's attack on the middle class and our Republic )
[ Post Reply | Private Reply | To 7 | View Replies ]

To: cymbeline
All of that inconveniences users, and won't solve the problem described in the article:

hacked their way into the social app website’s servers and got their hands on more than 32 million user passwords stored in plain text

Correct best-practice is not to store the password at all, but to store a "salted hash" of the password. That's why a correctly designed site will let you update your password, but can't tell you what your current password is -- they don't have it.

If you have to store a password -- you shouldn't, but if you did -- then it needs to be stored encrypted. Ditto for high-security data like SSNs, etc.

If there's a 99% cause of hacking, it's people running stuff they get as email attachments. For awhile, M$ Outlook even ran such stuff automatically! Talk about a security hole!

23 posted on 06/09/2021 7:41:22 AM PDT by Campion (What part of "shall not be infringed" don't they understand?)
[ Post Reply | Private Reply | To 7 | View Replies ]

To: cymbeline

2-factor authentication... you login... they text your cell phone a temporary key that’s good for like 10 minutes... you complete the login. Practically mandatory for online banking these days.


39 posted on 06/09/2021 9:16:20 AM PDT by Tallguy
[ Post Reply | Private Reply | To 7 | View Replies ]

To: cymbeline

The key is to get away from the password model and get into the token model. BUT, the token model is a giant pain in the butt.


47 posted on 06/09/2021 10:28:11 AM PDT by discostu (Like a dog being shown a card trick )
[ Post Reply | Private Reply | To 7 | View Replies ]

To: cymbeline

53 posted on 06/09/2021 11:07:39 AM PDT by null and void (When you put bad people in charge expect bad things to happen, often in a spectacular and sudden way)
[ Post Reply | Private Reply | To 7 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson