zlacker

[parent] [thread] 30 comments
1. yowzad+(OP)[view] [source] 2023-08-05 20:32:53
I guess more reason to just use a password manager to autofill your password?
replies(2): >>kypro+21 >>jgtros+E8
2. kypro+21[view] [source] 2023-08-05 20:41:31
>>yowzad+(OP)
Or just use 2fa
replies(2): >>bee_ri+y2 >>barrot+Vt
◧◩
3. bee_ri+y2[view] [source] [discussion] 2023-08-05 20:53:12
>>kypro+21
If you have 2FA and one part of it is easily figured out, then you have one factor authentication.

If you cared enough about the authentication in the first place to bother with 2FA, then I guess it seems like the reduction there is still something to be worried about, right?

Lots of “two factor authentication” schemes seem to involve just getting a text or something, so, not very secure at all. Of course, this is bad 2FA, but it is popular.

replies(2): >>gleenn+f4 >>GhostW+pa1
◧◩◪
4. gleenn+f4[view] [source] [discussion] 2023-08-05 21:07:46
>>bee_ri+y2
Perfect is the enemy of good. Text based 2FA is compromisable relatively easily but at least it's an extra hurdle.
replies(1): >>3np+Re
5. jgtros+E8[view] [source] 2023-08-05 21:45:06
>>yowzad+(OP)
Only if it doesn't only rely on a master password
replies(5): >>apendl+2b >>Guvant+Bj >>lamont+Rq >>kristo+wK >>teduna+dM
◧◩
6. apendl+2b[view] [source] [discussion] 2023-08-05 22:06:32
>>jgtros+E8
A nice thing about master passwords though is that since you don't have to type them in as often, they can be very long. 95% accuracy probably isn't good enough to reliably reproduce a sentence-length master password, at least if it's only captured once.
replies(4): >>belval+Ef >>koolba+Oh >>SideQu+6q >>coldte+3U
◧◩◪◨
7. 3np+Re[view] [source] [discussion] 2023-08-05 22:42:39
>>gleenn+f4
It's the "or just" being the issue there, not the "use 2fa".
◧◩◪
8. belval+Ef[view] [source] [discussion] 2023-08-05 22:50:29
>>apendl+2b
95% means that on average only 1 in 20 keystroke will be wrong. Even if your password is very long (40-60) that means only 2-3 errors. Since more people are not machines their long password will be a combination of words like the famous "horsestaplebatterycorrect" example from xkcd.

Even if you flip a few letters from something like the above a human attacker will easily be able to fix it manually.

"horswstaplevatterucorrect" for example is still intelligible.

replies(1): >>TheCle+Hg
◧◩◪◨
9. TheCle+Hg[view] [source] [discussion] 2023-08-05 23:01:57
>>belval+Ef
On average 2-3 errors. However the real thing we want to look at is what is my chance of guessing right across ALL characters. For 1 it's 95%, for 2 it's 90.2%, and it gets worse from there. The formula for accuracy would be .95^c where c is the number of characters in the password. So the chance of getting EVERY key correct in a 40 character password is < 13% and < 5% for 60 characters.
replies(3): >>llbean+Am >>whelp_+hn >>rightb+NC
◧◩◪
10. koolba+Oh[view] [source] [discussion] 2023-08-05 23:12:24
>>apendl+2b
The master password is also offline and require the key file to u lock the rest of the passwords. So by itself it’s not enough to compromise the accounts in the key file. The attacker would need the key file as well.
◧◩
11. Guvant+Bj[view] [source] [discussion] 2023-08-05 23:25:53
>>jgtros+E8
Doesn't everybody not require only a password?

Offline you need the database which isn't public.

Online you usually need something else on new machines to get at the true master password.

◧◩◪◨⬒
12. llbean+Am[view] [source] [discussion] 2023-08-05 23:52:46
>>TheCle+Hg
Right. The comment above is saying even if you are incorrect in 2-5 keystrokes it’s not hard to guess the correct keystrokes if you’re using a sentence style password.

You don’t need to guess every character.

◧◩◪◨⬒
13. whelp_+hn[view] [source] [discussion] 2023-08-05 23:57:36
>>TheCle+Hg
that's pretty high when you can use a computer to run the guesses
◧◩◪
14. SideQu+6q[view] [source] [discussion] 2023-08-06 00:25:57
>>apendl+2b
95% accuracy means for each stroke, the most likely key is the top choice. Most models return a probability distribution per key, and it's very like the other keys are in the top 2 or 3.

Then you simply have the password cracker start trying passwords ordered by probability, and I bet it breaks your sentence within very few tries.

◧◩
15. lamont+Rq[view] [source] [discussion] 2023-08-06 00:33:40
>>jgtros+E8
Don't type your master password on zoom calls
replies(1): >>jerome+ey
◧◩
16. barrot+Vt[view] [source] [discussion] 2023-08-06 01:01:50
>>kypro+21
Now that I know about the existence of this generation of acoustic attacks I would like to have the possibility to insert a second "master password" different from the main one, that instead of letting me directly access to my passwords just allows me to use fingerprint to get them. Guess if it's already possible
◧◩◪
17. jerome+ey[view] [source] [discussion] 2023-08-06 01:44:14
>>lamont+Rq
Or use your fingerprint
replies(1): >>worthl+NS
◧◩◪◨⬒
18. rightb+NC[view] [source] [discussion] 2023-08-06 02:37:45
>>TheCle+Hg
What if the password is typed twice? You can easely figure it out then.
◧◩
19. kristo+wK[view] [source] [discussion] 2023-08-06 04:12:13
>>jgtros+E8
[insert yubikey plug]

I don't use one but I know people who swear by them.

Also this is an extremely obvious result. Typing is obviously a form of "penmanship", it was well known that telegraph operators could identify each other by how they tapped out Morse code in the 1800s.

People have been able to do this based upon key stroke latency and even identify people based on habitual mouse patterns for decades.

Audio recordings work as yet another reliable proxy? Shocked!!

I am amazed that people can do such obvious things and get published, have articles written on them... I need to get in on that, sounds easy

I can make a web demo. You turn on the microphone type a couple things into a box on the web browser.

Then you go to a different window and continue typing and then the model predicts What you are typing. As long as it's proper grammar you can get to effectively 100% accuracy. It'll appear to be spooky magic.

I just might take the time.

replies(1): >>mercer+1N
◧◩
20. teduna+dM[view] [source] [discussion] 2023-08-06 04:38:57
>>jgtros+E8
What actually are you going to do if you spy on my zoom call and learn my master password is bigjarofpickles?
replies(1): >>Sai_+iO
◧◩◪
21. mercer+1N[view] [source] [discussion] 2023-08-06 04:52:16
>>kristo+wK
You sound confident enough that'd I'd like to see you show that off :P.
replies(1): >>kristo+V31
◧◩◪
22. Sai_+iO[view] [source] [discussion] 2023-08-06 05:12:31
>>teduna+dM
Hacker: tedunangst, what’s your email? Wanna invite you to that thing!

Hacker: man, I hate typing passwords. Do you use password managers? Any reccos?

… I am become hacker, destroyer of tedunangst’s bank account.

replies(1): >>microt+jU
◧◩◪◨
23. worthl+NS[view] [source] [discussion] 2023-08-06 06:13:18
>>jerome+ey
why is that ?
replies(1): >>microt+rU
◧◩◪
24. coldte+3U[view] [source] [discussion] 2023-08-06 06:33:22
>>apendl+2b
>a sentence-length master password

Ij on-tep of sentenca lentg, it's alio sentemce-bused ("corvect harse batterg stapfe") then ut would be quiti eady to guess even wits worse accurasy.

(If on-top of sentence lenth, it's also sentence-based ("correct horse battery staple") then it would be quite easy to guess even with worse accuracy.)

replies(1): >>Gh0stR+HW
◧◩◪◨
25. microt+jU[view] [source] [discussion] 2023-08-06 06:38:40
>>Sai_+iO
1Password requires an extra key upon the first login that you never have to type afterwards. So, have fun trying to log in to that password manager, even if you have the master password.

Also, you can also use and require a hardware FIDO2 token as second factor.

◧◩◪◨⬒
26. microt+rU[view] [source] [discussion] 2023-08-06 06:41:13
>>worthl+NS
1Password allows unlocking with a fingerprint (Touch ID) or Apple Watch, at least on a Mac. So you can unlock your password manager during a Zoom call, and nobody can snoop your master password.

(With 1Password, the master password is not enough to do a remote account takeover, you also need the second-factor key. And you can't snoop it, since it is only required during the first login, so a user will never type it after that.)

◧◩◪◨
27. Gh0stR+HW[view] [source] [discussion] 2023-08-06 07:19:30
>>coldte+3U
potential solution: keep a few intentional typos in your passphrases. It also makes dictionary attacks much harder.
replies(1): >>GhostW+ha1
◧◩◪◨
28. kristo+V31[view] [source] [discussion] 2023-08-06 08:47:29
>>mercer+1N
sounds like a good exercise although it'll literally just be for my own personal amusement. Nobody actually cares about this unless you've got some institutional clout which I do not. Praise for the PhD would be ridicule for you and me.

But really, should be fun ... the laptop dock mic will be great for this. If it's external you're in trouble ... but the researchers just used the onboard so it'll be fine.

◧◩◪◨⬒
29. GhostW+ha1[view] [source] [discussion] 2023-08-06 10:03:45
>>Gh0stR+HW
now you have to remember the the typos
replies(1): >>coldte+FC2
◧◩◪
30. GhostW+pa1[view] [source] [discussion] 2023-08-06 10:05:57
>>bee_ri+y2
which is the point of 2fa – when the 1st factor fails the 2nd holds
◧◩◪◨⬒⬓
31. coldte+FC2[view] [source] [discussion] 2023-08-06 20:13:26
>>GhostW+ha1
Plus, if they can tell what the actual words would be, then brute forcing the typos is trivial
[go to top]