free

News

collapse

User Info

 
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

* Recent Posts

Re: Stopping by by Sinister
[June 08, 2025, 01:58:04 pm]


Re: Stopping by by Ehks
[June 04, 2025, 12:25:17 am]


Re: Rest in peace by Stefanrsb
[June 02, 2025, 03:38:02 am]


Re: [SA:MP]House of Sforza | The Elite Power | Estd. 2006 | LS - LV by Stefanrsb
[June 02, 2025, 03:09:22 am]


Re: The Soprano Family | Royal Loyalty by Stefanrsb
[June 02, 2025, 03:00:31 am]


Re: The Gvardia Family || San Fierro's Main Power || Best criminal group of 09/10/11 by Stefanrsb
[June 02, 2025, 02:47:01 am]


Re: BALLAS | In memory of INFERNO 9 and NBA by Stefanrsb
[June 02, 2025, 02:31:29 am]


Re: Count to 1,000,000. by Stefanrsb
[June 02, 2025, 02:15:04 am]


Re: Stopping by by Traser
[June 01, 2025, 10:23:13 pm]


Re: Stopping by by Old Catzu
[May 18, 2025, 07:27:06 pm]


Re: Stopping by by TheRock
[May 18, 2025, 06:44:49 am]


Re: Stopping by by KenAdams
[May 17, 2025, 06:33:45 am]

* Who's Online

  • Dot Guests: 561
  • Dot Hidden: 0
  • Dot Users: 0

There aren't any users online.

* Birthday Calender

June 2025
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 [17] 18 19 20 21
22 23 24 25 26 27 28
29 30

Account Security Reminder 2015

Teddy · 14551

0 Members and 1 Guest are viewing this topic.

Offline Luke

  • Hero
  • ****
    • Posts: 2117
    With us since: 22/11/2008
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Lawrence King
Reply #15 on: April 10, 2015, 12:20:39 am
Just make sure your name isn't "Kaseem" and your password isnt "Kaseem"  :lol:



Offline Exterminator

  • Hero
  • ****
    • Posts: 2232
    With us since: 17/04/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Philip_Ancelotti
Reply #16 on: April 10, 2015, 10:55:52 am
Password managers are actually fairly secure; mainly one like last pass where the encryption key is never uploaded nor stored on the client. If you understand the fundamentals of public key cryptography then it'd make more sense. Breaking the encryptions, mainly with 10,000 password iterations would take at least a year of work for even the most advanced of mainframes. NSA broke the keyspace in partnership with a University as a demonstration; it took two datacenters along with a supercomputer 4 months to do it. So if you change the master password at least once a month; you're golden and change all other passwords at least every 30/90 days (1 month/ 3 months). Granted you follow all other precautions such as a two factor authentication, re-authentication strategy, etc. As with two factor authentication; even if the key is broken you'd steel need another origin to break and since as I recommended Google Authenticator; it isn't subject-able to common attacks that could bypass the TFA method.

If you use the manager just as is; without additional security measures then sure it'll only protect against site-specific targeting of passwords but not really a broad scale. But if you use it logically and with the additional security measures in place then you have a fairly trustworthy system.

It doesn't matter if you've got the most burglar proof castle in history if your home door's unlocked.

It is useless to argue about hacking into the password manager and decrypting your passwords. Equally ridiculous as breaking into a bank to get into your safe deposit box. A much easier way would usually be to just steal your key.

Similarly you can have the most secure password manager in the world, but in the end it's still got one master password. There isn't a big difference between using a password manager and using the same password on every site, since you need to compromise his password once to get access to all his logins.

The simple fact is that the chances of getting your password on your bank's site or getting the password you enter into lastpass is the same, as it's the same mechanism. You can install a keylogger on the target's PC, look over his shoulder or anything else. Now that you have his master password, you have all his passwords without ever having to read a single paragraph about cryptography.

You can increase your safety with other measure like buying lastpass's 55$ yubikey but that still doesn't mean you're not safe. You're more safe, sure. But compromising the yubikey isn't too hard either. You can look over someone's shoulder then pickpocket their yubikey. By the time they've managed to block the ubikey you've had more than enough time to change passwords and do some serious damage. Let alone the fact that if he has access to your email, you can fill in the blanks yourself..

Using your own passwords is better than using a single password for every site (And a password manager does indeed mean the same password since you only need ONE password). Changing your master password every 30/60/90 days won't help, it takes 30 minutes to cause very serious damage.


Philip_Ancelotti - Clans & Groups Moderator - Ancelotti Boss


Offline Johan_S

  • Orc
  • *****
    • Posts: 2254
    With us since: 29/12/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Reply #17 on: April 10, 2015, 11:02:33 am
123456.  :v:



Offline Pandalink

  • Araatus Kumichō
  • Orc
  • *****
    • Posts: 10358
  • The Strategist
  • With us since: 08/05/2007
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
    • The Araatus Yakuza
  • SA:MP: Panda_Araatus
Reply #18 on: April 10, 2015, 11:43:35 am
I don't think password managers for people like you Philip, since you seem to have your shit together. They're better for people like sony executives who have all their passwords on the internet as Password1.

Basically at least the single point of failure password isn't stored online. All of your examples involve the physical presence of another person at your workstation.

Panda Araatus  -  Sovereign Overseer  -  The Araatus Yakuza


Offline Murt

  • In nomine Patris, et Filii, et Spiritus Sancti
  • SA:MP Valar
  • ***
    • Posts: 8586
    With us since: 02/04/2010
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: [Rstar]Murt
Reply #19 on: April 10, 2015, 11:45:40 am
Just make sure your name isn't "Kaseem" and your password isnt "Kaseem"  :lol:

Now were you definitely funny. Just make sure you know your friends fairly before trusting them completely. They might be stabbing you in the back at some point.

Just a friendly advice above, nothing else.


Offline Devin

  • Drained
  • Orc
  • *****
    • Posts: 13332
    With us since: 27/07/2008
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Devin Seville
Reply #20 on: April 10, 2015, 11:53:05 am
Philip I wish you had put half of the effort you put into your posts here into ARUN.



Offline Luke

  • Hero
  • ****
    • Posts: 2117
    With us since: 22/11/2008
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Lawrence King
Reply #21 on: April 10, 2015, 12:47:49 pm
Now were you definitely funny. Just make sure you know your friends fairly before trusting them completely. They might be stabbing you in the back at some point.

Just a friendly advice above, nothing else.

Yeah agreed entirely.



Offline Marcel

  • Hero
  • ****
    • Posts: 0
  • With us since: 06/08/2007
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Marcel
  • Discord: Marcel#4759
Reply #22 on: April 10, 2015, 01:02:13 pm
Philip I wish you had put half of the effort you put into your posts here into ARUN.
Post-of-the-day award right here :rofl:




Offline Gimli

  • Maiar
  • *****
    • Posts: 6659
  • Gimli - also known as [Rstar]xcasio
    • xcasio
  • With us since: 21/05/2007
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Reply #23 on: April 10, 2015, 03:07:04 pm
Meanwhile on xkcd.com




Much MUCH better than having random.org generate a random 6 char password...

EDIT: then again, this doesn't account for dictionary attacks :|

"The purpose of life is to live it, to taste experience to the utmost, to reach out eagerly and without fear for newer and richer experience."
- Eleanor Roosevelt


Offline TeddyTopic starter

  • Orc
  • *****
    • Posts: 9161
  • "I'm on top of the world because of you."
  • With us since: 05/02/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Reply #24 on: April 10, 2015, 05:21:04 pm


First things first, you're never entirely safe. EVER. Any account, and server, and service, any site can be breached with the right skill set and the right determination. Any key, and encryption can also be broken with time and again determination.

Secondly, if done right you can equal the chances of someone getting any one of your passwords to that of getting your master password. In addition to master password, you'd need access to a physical device. Which sure, for a majority of people is totally fine as the biggest threat to account security is a REMOTE attacker not someone around you; for those exceptions sure they have a bit of compromised security unless they have additional security measures on the physical device for two factor authentication; allowing them to notice the device is missing and activate some sort of contingency (e.g remotely formatting the device, or simply going on to LP and changing the master password and resetting the two factor lock).

Clearly, we can go back and forth all week with this. The simple truth is password managers are only secure if you take appropriate precautions, are protecting against a remote threat, and have a minimal technical expertise to understand the concepts. Why don't we just agree to disagree.



Offline Exterminator

  • Hero
  • ****
    • Posts: 2232
    With us since: 17/04/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Philip_Ancelotti
Reply #25 on: April 11, 2015, 03:35:59 am
First things first, you're never entirely safe. EVER. Any account, and server, and service, any site can be breached with the right skill set and the right determination. Any key, and encryption can also be broken with time and again determination.

Secondly, if done right you can equal the chances of someone getting any one of your passwords to that of getting your master password. In addition to master password, you'd need access to a physical device. Which sure, for a majority of people is totally fine as the biggest threat to account security is a REMOTE attacker not someone around you; for those exceptions sure they have a bit of compromised security unless they have additional security measures on the physical device for two factor authentication; allowing them to notice the device is missing and activate some sort of contingency (e.g remotely formatting the device, or simply going on to LP and changing the master password and resetting the two factor lock).

Clearly, we can go back and forth all week with this. The simple truth is password managers are only secure if you take appropriate precautions, are protecting against a remote threat, and have a minimal technical expertise to understand the concepts. Why don't we just agree to disagree.

You're never safe, that's correct. Safety comes from taking a variety of measures, each of which increase your probability of remaining safe.  To choose an option that saves you from one kind of an attack but leaves you completely vulnerable to another is ridiculous to say the least.

The system provides great protection against any remote attacks, that's a given. But in return for that they do indeed open you up to almost complete physical obliteration. If someone manages to hack into your account remotely, they have several ways to do it, phishing, social engineering or implanting a virus to name a few. If they implant a virus they can get the yubikey's OTP signature and use it to log in, after keylogging your computer and getting your password, which would mean you're not safe from remote attacks either. Not to mention the fact that you're still open to the risk that anybody who knows you IRL can get your master password, it's not too hard. After that they can do anything from pickpocket you to break into your house (If they're short on cash and know you've got 30,000$ in your bank account, they're gonna break in..). That's assuming you don't have anybody close to you who can just lift it while you're sleeping for the night eg. A soon to be ex gf.

By using a password manager, you don't safeguard yourself against any kind of a virus attack. Hence the only way where the password manager protects you is in the case of something like phishing or social engineering, which you can avoid yourself if you just use your head. Further, the increased risk from a bruteforce attack is almost negligible, even if we assume the attacker carries out dictionary attacks he won't be able to try all the combinations even if he has the best military computer in existence. That is assuming the system doesn't ask him for a captcha after the third failure (And you can't exactly use a billion proxies either..) At maximum he eliminates barely a tenth of the operations, which is just an order of magnitude less.
Further, since you're now protected from phishing attacks you have paid the cost for it in the form of getting screwed over, bad. If someone from your real life manages to get your yubikey (And obviously the master password) they have the ability to do any kind of damage they want.

So on the overall it is a tradeoff of risk between a phishing attack and a real life felony. You reduce the risk that faceboook.com can get your password, and in return you accept the risk that a robber/thief/girlfriend can clear out everything you own. The probability for the latter may be low, but the profit (Or technically, loss) is infinite utility. While if you're careful, you'd never enter your details on a phishing website and hence have near zero risk whatsoever of anything that the password manager protects you from.

But yeah, let's agree to disagree.


Philip_Ancelotti - Clans & Groups Moderator - Ancelotti Boss


Offline Pandalink

  • Araatus Kumichō
  • Orc
  • *****
    • Posts: 10358
  • The Strategist
  • With us since: 08/05/2007
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
    • The Araatus Yakuza
  • SA:MP: Panda_Araatus
Reply #26 on: April 11, 2015, 03:41:48 am
Equally though, if that person wanted to take your money they could easily over-the-shoulder take any single specific password anyway, like a bank password.

I think in that situation you're just kinda screwed.

Panda Araatus  -  Sovereign Overseer  -  The Araatus Yakuza


Offline Exterminator

  • Hero
  • ****
    • Posts: 2232
    With us since: 17/04/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Philip_Ancelotti
Reply #27 on: April 11, 2015, 03:49:00 am
Equally though, if that person wanted to take your money they could easily over-the-shoulder take any single specific password anyway, like a bank password.

I think in that situation you're just kinda screwed.

In that case they would have only one password, not every password to everything you have.

Plus, if you're signing in front of some random stranger the odds are a hundred to one that you're signing into facebook and not your bank account. If they see your facebook password they can't use that to break into your bank.


Philip_Ancelotti - Clans & Groups Moderator - Ancelotti Boss


Offline TeddyTopic starter

  • Orc
  • *****
    • Posts: 9161
  • "I'm on top of the world because of you."
  • With us since: 05/02/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Reply #28 on: April 11, 2015, 05:23:44 am
Equally though, if that person wanted to take your money they could easily over-the-shoulder take any single specific password anyway, like a bank password.

I think in that situation you're just kinda screwed.

Who logs into a bank account in a public place easily noticeable? That's just stupidity and you deserve to get screwed. You don't even need to see them type in the password. There is software to analyze video and detect keypress' from virtually any angle.



Offline Exterminator

  • Hero
  • ****
    • Posts: 2232
    With us since: 17/04/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Philip_Ancelotti
Reply #29 on: April 11, 2015, 10:50:46 am
Who logs into a bank account in a public place easily noticeable? That's just stupidity and you deserve to get screwed. You don't even need to see them type in the password. There is software to analyze video and detect keypress' from virtually any angle.

You don't even need that. A few years ago police in my city busted a gang where they simply went to an internet cafe in the morning and stuck a small device below the keyboard. At night they'd return and take out the device. The device obviously was a vibration detector.

Most internet cafes used a very small range of keyboards (Usually just that old same 4$ iBall keyboard), they'd make a mental note of which keyboard they saw and if they didn't already have it, they'd go to a computer shop and buy that keyboard. They used automated software to compare the vibrations from pressing different keys to the vibrations detected by the device, allowing them to recover the exact keystrokes. This means that you don't even need to install keyloggers or security cameras (Which is much harder than just putting a tiny 1cm radius disk below the keyboard), just using an unknown keyboard is enough.

And that happened in India. You can only imagine what kind of devices would be floating around in countries where they don't teach you programming on 20 years old compilers.


Philip_Ancelotti - Clans & Groups Moderator - Ancelotti Boss


 


free
SimplePortal 2.3.7 © 2008-2025, SimplePortal