Discussion about this post

User's avatar
Evan Harper's avatar

Surely you've followed the 25-year saga of fake two-factor identification? This is just a refinement of that. The reusable bag of security theater.

Alexander van Olst's avatar

> Whenever I hear about a lot of passwords being stolen by a “hacker,” I think “inside job.” I figure that it must be much easier to break into a computer system with help from someone on the inside than it is to just cleverly hack your way in.

Because most users are really bad with password re-use, there are a lot of incentives for people to figure out the "cleverly hack your way in from the outside" so I don't think this inside job thinking is quite right. Generally the path is "find a users credentials on some system of little consequence with poor security" so that you can see if those same credentials work on important things like banking/email/online shopping

23 more comments...

No posts

Ready for more?