TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Twitter Porn Names Scam

45 pointsby coglethorpeabout 16 years ago

6 comments

dsingletonabout 16 years ago
It really frustrates me when sites require a question and secret answer like "hometown" or "mothers maiden name".<p>Those are both very easy to find pieces of information. Let me select the question myself too. By forcing me to give you answer here you're potentially making my account _less secure_.<p>Right now I have standard fake answers to those questions, let's hope they never cross reference those with anything else. I'm not sure how I'd convince someone my mothers maiden name is "&#60;insert comedy name here&#62;"
评论 #605734 未加载
评论 #605500 未加载
评论 #605404 未加载
评论 #606629 未加载
评论 #605395 未加载
raganwaldabout 16 years ago
Authenticating users with passwords and "secrets" such as your hometown, high school, or first street name are all ridiculous strategies. My not-so-inner cynic suggests that banks know this but think they are safe from lawsuits as long as such methods are "industry standards."
评论 #605489 未加载
评论 #605756 未加载
bonsaitreeabout 16 years ago
Keep in mind these are all meant to be in-channel "back-up" strategies for when usual authentication methods fail and/or human error results in a complete loss of credentials. Forcing a true side-channel workflow for re-authentication and credential recovery isn't practical for most organizations.<p>A more secure, but frustrating for the dis-organized, approach is to email out a small set (3-5) of one-time credential-recovery passphrases (often called a scratch-list) with the initial account approval message.<p>Another slightly more usable forced-in-channel alternative includes image file recognition where the user selects from a predefined set of pictures to use as their "shared secret" when the account is created. Typically, a salted hash of the image file is stored as the actual password value so multiple versions (slightly bit skewed) of the same visual representation can be leveraged for password expiration.<p>Alas, all of these more secure alternatives limit the user's ability to "personalize" their shared secret and require additional bookkeeping.
jimflabout 16 years ago
C'mon, that porn name formulation is as old as the hills. --Duffy Kauffman.
tlrobinsonabout 16 years ago
Of course it would be just as easy to actually ask for the user's password, like many Twitter applications do...
badger7about 16 years ago
Whenever forced to use one of these authentications, I just wail on the keyboard to provide an answer. My mother's maiden name? Why, it's "sfdgh,jsdzl.kg hjsldghs,hb".
评论 #605387 未加载
评论 #605374 未加载