Hacker News new | past | comments | ask | show | jobs | submit login
Protecting Secrets from Computers (2023) (acm.org)
63 points by antlai 4 months ago | hide | past | favorite | 25 comments



My biggest challenge as I’m getting older is remembering my long secret key.

Even with a password manager that requires me to remember only a few passphrases (personal and work being two), there is a non zero chance now that a fall and a concussion would lock me out of my password manager.

Anyone else have a solution or a suggestion for this problem?


My wife has my passphrases in her password manager and I have her passphrase in my password manager.

This is maybe not the most secure way to do it, but this is good enough for our threat model.

These are offline password managers.


Wear a helmet and hip pads, but failing that split the password in half (as in literally the first half and the second half, don't try to get fancy with crypto) and give the halves to two people unlikely to collude. Your computer will no longer have 5th amendment protection, though.


Or better, use `Shamir's Secret Sharing`

https://en.wikipedia.org/wiki/Shamir%27s_secret_sharing


GP specifically called out, "don't try to get fancy with crypto" and I'm inclined to agree with them for this use case.


Shamir's secret sharing with 3 separate lawyers is kind of hard to beat if you have cryptocurrency or other similar assets that absolutely need a password to recover it, and it is a relatively easy algorithm to run. Give them the same instruction sheet on how to run the algorithm, plus a different second page with their fragment of the key.

Most of the time, though, the "call us" approach actually works, and you can give your relatives power of attorney to handle this.


Use the good old post-it method

Remember poe : what's hidden in plain sight is never found (and nobody is looking anyway)


Write it down on a piece of paper.


You could try Entropy Keycrypt -> https://entropykey.com/features


Yes. Place the secrets in a secured (symmetric encrypted) document. Then print the password for that document and hand it to a loved one, trusted family member/friend, or lawyer.


Biometrics?


Maybe I'm dumb, but how do you read the article?


Ah, you click on "All Formats". Which is apparently a synonym for the verb "read".


No! you click on the pdf button which... uh... opens an empty firefox tab



Click the red PDF button. Or click the "view all formats" button to select your prefered option.


What about reducing our usage of the Internet and using local resources instead? Personally I have local mirrors of various code repositories, and thousands of ebooks. If you want to nearly eliminate all surveillance, then you can air-gap your computer?

So we shift back from the collective (networked) systems to a more individualistic local information store? We already have local AI models, which is a step in the right direction.


Still reading but this is an interesting position to juxtapose with the repeated axiom that thou shalt not roll thine own crypto.

Instead, the claim here is that you cannot trust crypto that you didn't roll yourself. Indeed, maybe you should compute it by hand!

Ha! I love having my beliefs challenged.

Completely impractical but very fun.


Only keep your passwords in your head. That way only one person can know them - you. And then, you can forget them, and now no-one knows them.

As we continually have told to and is pushed upon us by IT - this is the most secure system to have.

The one that no one can use.


Passwords are useless if only you know them.

You can use private keys like that, but people are not expected to remember them.


Is there a good pen-and-paper OTP authentication mechanism?



I was talking about a point discussed in the article. There is an attack on OTP because the attacker can change the message if there is no hash-like authentication of the message's correctness. I asked if there was a pen-and-paper way to authenticate an OTP message.


* Pricing

Pricing and access depends on your membership or subscriptions with ACM. Purchase this Article Purchase this Article: Protecting Secrets from Computers Terence Kelly

    Purchase Article
    Purchase Article
    Non Member$15.00
    ACM Professional Member$10.00
    ACM Student Member$5.00

    Already an acm Member? Sign In or become a member
deepdyve logo Available at DeepDyve

The Largest Online Rental Service for Scholarly Research

Price: $0.00 *

I.A. or similar link kindly requested please. TYIA


All you have to do is click "all formats" and select one.

https://queue.acm.org/detail.cfm?id=3623614&doi=10.1145%2F36...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: