TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Secrets, Lies, and Account Recovery: Personal Knowledge Questions at Google [pdf]

34 pointsby giltleafabout 10 years ago

6 comments

joshuakabout 10 years ago
Nice to see someone finally formalizing what to me seems pretty obvious. Adding account recovery inherently lowers security.<p>1. Additional vector of attack with lower than password threshold of security.<p>2. Questions may have common answers.<p>3. Few possible answers.<p>4. Publicly available answers.<p>5. Social engineering can phish for answers easily.<p>6. Answers may be easily known or guessed by social proximity (family, friends, coworkers).<p>Transient information questions like &quot;favorite food&quot;, unknown strictness rules like capitalization or character exclusions cause users to pick consistent answers that do not necessarily relate to the question.<p>This along with inconsistent passwords rules across all sites, and none of them showing the rules on the login page to remind you, piss me off to no end. Please can we start using public key cryptography, and just have our own private keys? Please!!!!<p>If you ever create password based web apps or work in security please at least watch this MIT lecture.<p><a href="https:&#x2F;&#x2F;youtu.be&#x2F;M2gc6b1hmk8?t=5m15s" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;M2gc6b1hmk8?t=5m15s</a><p>(cued to start of lecture)
评论 #9590903 未加载
评论 #9590738 未加载
shabbleabout 10 years ago
From a quick skim of the paper, it doesn&#x27;t seem like they mention how they acquired the data, other than some mention of how it&#x27;s secured by their rate&#x2F;count-limiting process.<p>I&#x27;d hope they&#x27;re storing it all as one-way digests, and it occurs to me that their strength metric (% number guessable given X attempts) might in fact be them brute-forcing their own data. Or they could log the inputs and result of each attempt by actual users during their experiment.<p>Or they could be secretly parsing and storing it all, and consequently know enough about you to guess most of your other services, should they NSL^Wneed to.<p><i>&quot; For example, it was estimated that it actually takes over 2^100 guesses to compromise an average password due to the presence of less than one in a million users choosing 128-bit random strings as passwords&quot;</i><p>I&#x27;ll be the one looking smug until I misplace my personal password database.
sssilverabout 10 years ago
I do my own questions, and specify a format. Example secret question: FirstElementaryTeacherLastName::First&#x2F;Girlfriend&#x2F;Name--moms_maiden<p>Example secret answer: Kochoyan::Arev&#x2F;Petrosyan--lusine_markosyan<p>Of course it doesn&#x27;t have to be all human names, and formatting also adds a thin layer of security.
评论 #9590741 未加载
morganteabout 10 years ago
I&#x27;m glad to see someone quantifying that &quot;secret&quot; questions are a basically useless security measure and inherently harmful.<p>Probably the worst example of these security questions is Tradeking. Normally, I just answer the security question with a random password stored in 1Password. Unfortunately, Tradeking has the genius practice of displaying your answers as a multiple choice—when 84209t920tq3g is offered as an option for a hometown, it&#x27;s pretty obvious. Needless to say, this caused me to close my account immediately.
mark_l_watsonabout 10 years ago
I don&#x27;t like personal knowledge questions. I try to give obscure answers and note my answered in my encrypted password file. So there is no benefit: I lose my encrypted file and I lose my obscure answers to these questions.
maartenschollabout 10 years ago
I hash the personal question using a common hashing algorithm together with (another) passphrase.