Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month at the Massachusetts Institute of Technology, in Building E51.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] Most common (or Most important) privacy leaks



On 02/18/2015 12:30 PM, Richard Pieri wrote:
> On 2/18/2015 11:20 AM, Bill Bogstad wrote:
>> And the same users are going to use "Four score ...." if you require
>> longer passwords,
>>   so you lose anyway.
>
> I did preface that with "[p]assword reform starts with...".
>
> Key chain managers can be a good next step. They allow the use of
> arbitrary, random gibberish as passwords in a way that users only need
> to remember one good password for unlocking the key chain. In essence
> they can do the same thing that heavy duty encryption systems do: they
> generate large random keys for actual encryption and encrypt these
> keys with user-provided passwords or passphrases. This way you can
> have strong passwords without any password reuse. Link a key chain
> manager to a trustworthy third party and you can have a robust
> password management system that is resistant to attacks.
>
One issue I had with SecureID years ago was that it required you to log
in within a certain amount of time. The number on the Secure Id was hard
to read, and it would take me a couple of times before I was able to
type in the number and the pin before the time out. But, I would agree
that keychain managers are a viable solution.

-- 
Jerry Feldman <gaf at blu.org>
Boston Linux and Unix
PGP key id:B7F14F2F
PGP Key fingerprint: D937 A424 4836 E052 2E1B  8DC6 24D7 000F B7F1 4F2F





BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org