Archive for the ‘Computing’ Category

Usernames, the underused security

July 16, 2023

Usernames and passwords. Computer (and smartphone) users have been encouraged to use their email address as their username for quite a few years now. This is a shame. Because a username can be a full-fledged participant in the credentials used to thwart bad-guys almost as effectively as passwords can.  But it can only be effective if it is variable. If you use the same string of characters for every username of every site you have access to, then its effectiveness is diminished considerably. This is especially true if the username is also your email address.

Let me explain. The traditional single factor authentication requires two components, a username and a password.  Actually, it requires three components, I’ll explain that in a moment.  Traditionally the username has been something you are. For the most part, this does not change and is easy to remember.  Traditionally it has been a variation on the name that a human user has (e.g., “ckent”), or sometimes, a name they might have wished they had, (e.g., “Superman”). But either way, its variability per user has traditionally been extremely low. Sometimes no greater than one per person, across all websites. This is easy to understand, but it wastes a resource that could be used in the battle against the bad-guys.

The password, on the other hand, has been something you have. For each website, or more accurately, for each set of credentials, you are encouraged to “have a different thing.”  The “thing” that you have for website A is not supposed to be the same as the “thing” you have for website B. That is, you are advised to have a different password for each website. This is a good thing. However, it is not 100% necessary when multiple possible usernames are used.  It is the combination of username and password, taken together, which should be unique for each website you use. This does, of course, require you to remember both your username and password for each website you engage with. And it undermines the concept of “what you are.”

With the advent of Password Managers on the market, however, the need for using the same username for each website is diminished[i]. A Password Manager is as capable of remembering, and submitting to a website, a unique combination of characters for a username, as it is for a password.  As a matter of fact, the distinction between them, username and password, is swiftly disappearing and the submission of a single unique string for security purposes is becoming more common. This string can be a string on digits, which you have sent to you and you repeat, or more often now a days, activated by the answering of a yes or no question (e.g. “was that really you who requested access” or something of that nature.

The third component, by the way, is the website URL (universal resource locator).  The combination of a username and password is just a string of characters unless you (or the bad-guy) know the web address (i.e., URL) of the website to which it grants access to the entity, the “who” that is attempting the access.  Once granted access, this entity becomes the Principle in all interactions within the website. Its ability to do harm or good is determined by its authorized privileges, on that website. The Principle does not take it (the authorized privileges) with them, as a backpack traveling from site to site in cyber space. Rather he picks them up just inside the door as he enters

I use the term Principle in this case because by the time access is granted neither the software nor the hardware any longer know[ii] who the entity (now Principle) is or was, nor even if it was a “who” in a 6BI sense.  A Principle is an authenticated user, and is supposed to be you, or your authorized agent.  It could still be a “robo-user” and will increasingly be so, but the assumption is that it is a proxy for a human user, acting on their behalf.


[i] The need for always using the same username, your email address for example, is diminished, but still encouraged.

[ii] Please excuse the ethnocentrically empowered reference.

Master Passwords, Drugs & Tulips

May 31, 2023

Don’t put a lot of faith in relying on “physical access” to keep data safe. The only thing you really need physical access to the box for anymore is to plug it in. What does concern me is that bad players are gradually figuring out the memory mappings of these password managers on their servers, not just on the clients.  This then becomes an enterprise security risk and not just a personal device risk.

If you can get the master password off of an iPhone you get to ruin somebody’s day, but if you can get the database with the master passwords of a company’s customers you get to ruin a lot of folks’ days.  

The incentive to attack the servers comes from the value of the exfiltrated data on the cyber black market. There the data is sold and re-sold down the food chain to lesser and lesser skilled bad guys. Finally the guy holding the bag when the music stops realizes he is the ultimate sucker. 

If you think about it, it is not unlike street drugs… or for that matter, it is not unlike the Dutch Tulip mania of the 17th century either.

Evil Geniuses

July 22, 2022

Ad page purveyors are getting trickier. If you are like me, you probably get many, maybe dozens or even hundreds of unsolicited ad pages sent to your email every day. For many years I’ve just ignored them. Sometimes reading them, sometimes not and just deleting them. However, deleting does not make the sender go away. I had often read that one should not click on the unsubscribe link, as that only tells the sender, or more accurately his or her software, that a live person is at the other end of the connection.

Lately I’ve decided to just click “Unsubscribe” on the ad page… if I can find it… and see what happens. For the most part it works fine. Many senders really have stopped sending me their ads. Some have not, of course.

However, I’ve recently noticed a trickier thing they do. If appears that at least some percentage of the ad purveyors place the unsubscribe page outside of the security umbrella of their HTTPS link (i.e. the unsubscribe page has only an HTTP URL). This means that if you have a “watch dog” internet security system installed on your computing device you will get a message from it advising you that the page you requested is not secure, and do you want to proceed or go back. Some ad purveyors are now trying to scare users into staying subscribed.

If enough users, fearing what might happen if they venture into “unsecure” territory, choose to go back and not click the “Unsubscribe” button, then they (the ad purveyors) may not lose as many subscribers as they would if they had been just a little more transparent. In this way their ad site may not suffer the indignity of losing as many subscribers.

As always,

Have a rewarding compute

The merging of computer security and crypto-mining

January 7, 2022

I think it’s a great idea to merge cryptocurrency mining with other more consumer friendly software applications.  It just makes sense.  Its slightly incongruous to merge crypto-mining with computer security software, but the main idea is the same.  Some circumstances come to mind.  First it is a way to get your software application to “pay for itself”.  In theory, you could use any money (crypto or conventional) that you make to offset the cost of the software package/platform.  The more successful you become at mining, the closer to zero the net cost of the extended package will become.  It could even produce a positive income stream in your favor so that your software package becomes a profit (instead of cost) center for you.  Secondly it is an avenue to make crypto currency mining more democratized and within reach of less and less sophisticated users, which after all has been the trajectory of personal computing for the past 50 years anyway.  And, thirdly it is a strategy for third party software companies to stay in the game and not be relegated to the backwaters of the computing world by making themselves more relevant to modern computing trends.

Chromebook 101: how to use Android apps on your Chromebook – The Verge

March 10, 2020

With Google discontinuing support for the Google Chrome Store apps (see:  https://chromeunboxed.com/google-announces-timeline-for-the-end-of-chrome-apps-on-chromebooks/ ) over the next year, it is probably a good idea to get familiar with Google Play Store (i.e. Android) apps.

Google Sheets or Microsoft Excel? The differences are disappearing — Quartz

September 19, 2019

https://qz.com/1283203/google-sheets-or-microsoft-excel-the-differences-are-disappearing/

Google Kills Hyper-Threading On Chrome OS In Wake Of Critical Intel Flaw

May 15, 2019

https://chromeunboxed.com/google-kills-hyper-threading-on-chrome-os-in-wake-of-critical-intel-flaw/

Android Authority: 8 years on from the first Chromebooks: Google was right about them

May 11, 2019

Android Authority: 8 years on from the first Chromebooks: Google was right about them.
https://www.androidauthority.com/google-chromebook-launch-984205/

New Feature Coming For Chromebook Extended Displays

April 13, 2019

New Feature Coming For Chromebook Extended Displays

It looks like Display Port and USB-C are required for daisy chaining monitors with Chromebooks.

The Verge: Microsoft’s Chromium Edge browser is now officially available to test

April 8, 2019

The Verge: Microsoft’s Chromium Edge browser is now officially available to test.
https://www.theverge.com/2019/4/8/18300077/microsoft-edge-chromium-canary-development-release-download