Hacker News new | comments | show | ask | jobs | submit login

I realize that, but you didn't answer my question. What do you propose they do instead?

hardware tokens and/or biometrics (depending on the system they need access to). soft tokens (e.g. mobile devices) for low-sensitivity systems. widely available COTS laptops have fingerprint scanners, ffs.

given the nature of the work the system shouldn't be comprisable if a picture of a password gets out, which is suggested in this case. (the fact that it was written down suggests other failings, yes, in all sorts of areas.) your objections (cost, usability, etc), in this case, are pretty weak when you consider the sensitivity of the assets being protected.

soft token-based two factor auth is a growing commodity. key-based auth is commonplace now, and is recognized as strong. finally USB-tokens are also COTS at this point. given that a major government agency which supposedly knows a lot about security got hosed by this, i would expect the market to lag, not lead, security practices.

Laptop fingerprint scanners usually work by just storing the windows password in the registry (under reversible encryption). I'm not sure that's really a security enhancement.

Example: http://arstechnica.com/security/2012/09/windows-passwords-ex...

And every one of your examples uses passwords in conjunction with a second factor, or uses biometrics which is a heavily flawed idea as I previously pointed out. Your answer does not support the comment you originally made. You're fighting windmills brother.

see, i don't think i am "fighting windmills", as you can guess, and here's why. the implication of having to change passwords due to this photo is that the only thing between an outsider and the inside was a password. my original comment was that no one had yet questioned the viability of passwords. not a one! so far it has just been "oh, i would have gotten shitcanned for that, lucky him he's a royal" and "oops!" no one on the esteemed HN had spoken up that holy crap passwords.

while my job in infosec isn't related to AAA i know that better stuff exists and that it's in budget and applicable here. i offered some ideas, you offer up criticisms, but i'm still wondering how no one had spoken up about the crappiness of it being 2012 and we still rely on passwords.

just a few days ago this link was posted here:


and also this one from wired:


given all the breaches in the past 2 years by lulzsec and relatives you'd expect a bigger outcry here. nope, not yet.

you honestly think this is the best we have? i sure don't.

here's some (i imagine) better COTS stuff out there: http://www.yubico.com/products/yubikey-hardware/yubikey/

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact