On 8 Jun 2012, at 22:59, John Levine wrote:

> Given that most compromised passwords these days are stolen by malware
> or phishing, I'm not understanding the threat, unless you're planning
> to change passwords more frequently than the interval between malware
> stealing your password and the bad guys using it.
> 
> I agree that keeping a big file of unsalted hashes is a dumb idea, but
> there isn't much that users can do about services so inept as to do


Hi John,

I can't easily reconcile the statement that "most passwords … are stolen by 
malware/phishing" with the subsequent para referring to the likes of LinkedIn 
(6.5 million apparently without usernames) or Playstation Network (77 million 
with PII) or RockYou (32 million IDs) … but then I lack stats for the former, 
perhaps you can tell me how many tens-of-millions of people got phished last 
year?  

Creditcards scraped by malware may touch that number, but might be themselves 
outpaced by wholesale CC database theft.

Sometimes password changing is done for reducing the window of opportunity, 
other times it is for education, yet more times it's for both, or to get 
everyone to refresh their password so the new Bcrypt or SHA512crypt hash 
algorithm can be enabled and the crummy old short Unix passwords 
(aaU..z/8FAYEc) can be expunged.  

With the right tools your identity can be quite (shall we say?) agile and 
involve a lot of hard work for bad guys to hit.   That's the goal.

Turning the matter on its head:  How tragic would it be for someone still to be 
using the same password that they were using in the Playstation hack, 14 months 
after the event?

Is 14 months a excusable length of time for someone not to have changed their 
password after a break?  

I would say not - but then would 6 months be any more excusable?  

Or 3 months?  

How long is it excusable to not get around to changing a known-to-be-hacked 
password?  

And what if you don't know you've been hacked?

In this game of diminishing time windows and not being sure about whether 
User-A's password was taken but User-B's was not, perhaps the best strategy is 
to assume that all passwords are likely broken after a period of time and to 
change all of them - but that idea does not appeal to everyone; I can see why, 
but perhaps my goals are different.

        -a


Reply via email to