NYT

Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000

MIAMI — The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary vote to pay nearly $600,000 in ransom to hackers who paralyzed the city’s computer systems. Riviera Beach, a small city of about 35,000 people just north of West
/
NVIDIA Builds Supercomputer to Develop Self-Driving Cars

NVIDIA Builds Supercomputer to Develop Self-Driving Cars

In a clear demonstration of why AI leadership demands the best compute capabilities, NVIDIA today unveiled the world’s 22nd fastest supercomputer — DGX SuperPOD — which provides AI infrastructure that meets the massive demands of the company’s autonomous-vehicle deployment program. The system was built in
/

Caveats about ‘Password’

Continued from Part 1…

Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’.

We are of the view that it would be desirable to define ‘Password’ broadly enough. As a denotational definition, it could be ‘Whatever we remember and recall volitionally for identity authentication.

As a connotation, it could be “A shared secret known only by two consenting parties. The secret will be submitted by one party to the other on request. It is used to verify legitimate access to an asset of shared interest.” (This is suggested by my British friend.)

By the way, password-like texts written on a memo or stored in a physical device should desirably be given other names than ‘Password’. For now I would like to call it ‘physically possessed password’ as against ‘password’ or ‘remembered password’.

Physically possessed high-entropy passwords have a potential merit of being strong against brute force attacks but it is as vulnerable to physical theft as other physically possessed objects like cards and tokens.

We do not see any difference against wiretapping between the remembered and physically possessed passwords.

Caveats about Biometrics

Biometrics is a useful tool for forensic and other purposes of personal identification in physical space. As for identity authentication in cyber space, it brings not just better convenience but also some protection, which is better than nothing although lower than a password-only protection. .

We would reiterate that biometrics could be recommended where convenience matters, but must not be recommended where security matters.

Caveats about ID federations

ID federations such as single-sign-on services and password managers indeed help us mitigate the burden of managing so many passwords. On the other hand, ID federations create a single point of failure like putting all the eggs in a single basket. It manages all my passwords when un-hacked and loses all my passwords to criminals when hacked.

ID federations should be operated in a decentralized formation or should be considered mainly for relatively lower-security accounts, not for the highest-security business accounts which should desirably be protected by all different strong passwords unique to each account. Needless to say, the strength of the master-password is crucially important in any case.

Caveats about Two/multi-factor authentication

It certainly could have a big merit for better security. It should, however, be operated with caveats.

Firstly, ‘2’ and ‘3’ are indeed larger than ‘1’ on paper, but we should not forget that two or three weak children may well be much weaker than a single tough guy. Secondly, physical tokens, cards, phones and memos are easily left behind, lost, stolen and abused. Then the remembered password would be the last resort.

The two/multi-factor authentication could be reliable only when it comes with a reliable password. A truly reliable two/multi-factor solution desired for most important accounts requires the use of the most reliable password.

Incidentally, we would like to repeatedly emphasize that all the factors of two/multi-factor authentications must be deployed ‘in series’, not ‘in parallel’. Biometrics deployed ‘in parallel’ instead of ‘in series’ must not be counted as a factor of the two/multi-factor authentications. We need to harbor a serious doubt when we hear of a two/multi-factor authentication that is claimed to have a biometrics as a factor of it.

Outstanding Features of Expanded Password System

People who enjoy handling images will gain better security and convenience. The only extra effort required is to get the images registered. But people already do that across social media platforms and seem to love it.

So far, only texts have been accepted. It was, as it were, we have no choice but to walk up a long steep staircase. With Expanded Password System, we could imagine a situation that escalators and elevators are provided along with the staircase. Or, some of us could think of all those ladders we have for climbing in Donkey Kong.

Where we want to continue to use textual passwords, we could opt to recall the remembered passwords, although the memory ceiling is very low, Most of us can manage only up to several of them.

We could opt to recognize the pictures remembered in stories where we want to reduce the burden of textual passwords. The memory ceiling is high, say, we would be able to manage more and more of them.

Where we choose to make use of episodic image memory, we would only need to recognize the unforgettable images, say, KNOWN images. There is virtually no memory ceiling, that is, we would be able to manage as many passwords as we like, without any extra efforts.

The role of episodic memory

It is known that the episodic memory is the cognitive core of our continuous identity. It ensures the continuity of our perception of our self.

It is obvious that our bone, flesh, fat or skin does not make our identity as a citizen living in societies. We could be more rational in defining our identity as a social being.

Changeability of Episodic Memory

It’s known that episodic memories are easily changeable. What we remember as our experience may have been transformed and not objectively factual. But it would not matter for Expanded Password System. What we subjectively remember as our episodic memory could suffice. From confidentiality’s point of view, it could be even better than objectively factual memories since no clues are given to attackers.

Competition to Expanded Password System

Competition could be thinkable only among the different products of Expanded Password System since:

  • Biometrics requires passwords as a backup means.
  • Password-managers and single-sign-on services require passwords as the master-password.
  • Multi-factor authentications require passwords as one of the factors.
  • Pattern-on-grid and conventional/emoji-passwords can all be deployed on our platform.

Position of Our Proposition

We make identity authentication schemes better by leveraging the time-honored tradition of seals and autographs. The underpinning principle of Expanded Password System shall not go away so long as people want our own volition and memory to remain involved in our identity assurance.

Why have people been sticking to characters for password authentication?

Frankly, we have no answer. It is now broadly known that human beings are far better at remembering and recalling visual memories than doing the same for texts. We have hundreds of millions of years of history for the visual memory whereas the history of our text memories is no more than hundreds of years for most of us.

It is also known that CPUs are now fast enough, connection band broad enough, data storage cheap enough and digital cameras affordable enough. There is absolutely no reason to hesitate to use images for identity authentication.

And yet, people apparently think only about texts when they talk about passwords. We could only think of ‘momentum’, ‘sheer force of habit’ or cognitive bases like ‘normalcy bias’. We may need to ask for the help of researchers of cognitive science and behavioral economics

Why has Expanded Password System been so unknown for as long as 17 years?

People who were carried away by the hyped attractiveness of biometrics and the inflated hi-tech image of password-less solutions would not listen to us.

Actually, over the period of 2003 to 2008 we were successful in Japan. We saw several commercial adoptions amounting to some US$1 million, even though the CPU was slow, the band narrow and the storage expensive in those days.

It then ceased to grow as people were more and more carried away by the biometrics and password-less solutions which the advocates alleged would kill the likes of passwords altogether, even though we knew that biometrics have to depend on the password as a fallback measure against false rejection and that a real password-less society would only mean Dystopia.

After struggling in vain to fight back for several years, we chose to get out of Japan where biometrics vendors were overpoweringly dominant, and started to look for bigger chances worldwide. We now have a lot of friends and supporters globally. Expanded Password System is now acknowledged as ‘Draft Proposal’ for OASIS Open Projects, with us given the chances to speak in front of the professional audience of Consumer Identity World 2018.

Why have so many security professionals tried not to listen for so long?

Our view is that those professionals, who had loudly advocated, promoted and endorsed biometrics and password-less authentications, might well suspect that listening to us could throw them into an awkward psychological situation that is extremely inconvenient and embarrassing to them.

We could think of ‘cognitive dissonance’ coupled with such cognitive biases as ‘sunk-cost bias’, ‘confirmation bias’ and ‘normalcy bias’. It could well provide a very good research theme for sociology, psychology, cognitive science and behavioral economics.

More topics are discussed here.

Conclusion

Expanded Password System that we advocate is supportive of:

1. Biometrics that require passwords as a fallback means against false rejection

2. Two/multi-factor authentications that require passwords as one of the factors

3. ID federations such as password managers and single-sign-on services that require passwords as the master-password.

4. Simple pictorial/emoji-passwords and patterns-on-grid that can all be deployed on our platform

All with the effects that handling memorable images make us feel pleasant and relaxed and that it enables us to easily manage the relation between accounts and the corresponding passwords.

5. And, nothing would be lost for the people who want to keep using textual passwords.

6. Lastly but not the least, it is democracy-compatible by way of providing the chances and means to get our volition confirmed in having our identity authenticated.

By Hitoshi Kokumai

Hitoshi Kokumai

Hitoshi Kokumai, President, Mnemonic Security, Inc.

Hitoshi is the inventor of Expanded Password System that enables people to make use of episodic image memories for intuitive and secure identity authentication. He has kept raising the issue of wrong usage of biometrics with passwords and the false sense of security it brings for 16 years.

Mnemonic Security Inc. was founded in 2001 by Hitoshi Kokumai for promoting Expanded Password System. Following the pilotscale operations in Japan, it is seeking to set up the global headquarters.

View Website
GDPR Compliance

A Quick and Dirty Guide to GDPR Compliance

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union ...
Collaboration and Beyond: Four Technology Trends That Will Have Maximum Impact

Collaboration and Beyond: Four Technology Trends That Will Have Maximum Impact

Collaboration Trends Four Technology Trends 2017 is coming to an end, which marks the time of year when we take ...
Who Leads Digital Transformation? Historically, It Was The CIO

Who Leads Digital Transformation? Historically, It Was The CIO

Who Leads Digital Transformation? On my way to the office last week, I was stopped at a stoplight that only ...
Why Open Source Technology is the Key to Any Collaboration Ecosystem

Why Open Source Technology is the Key to Any Collaboration Ecosystem

Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely ...
ZDnet

Apple’s Tim Cook: Silicon Valley has created privacy-violating ‘chaos factory’

/
Big tech companies are failing to take responsibility for the chaos that their innovations have created, according to Apple CEO Tim Cook ...
Tech Crunch

Startup founders need to decide how much salary is enough

/
Startup founders don’t typically launch a company as a get-rich-quick scheme. Most know that it will be a long, hard slog if they are to succeed. There will be lean ...
Tech Crunch

MIT develops a system to give robots more human senses

/
Researchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have developed a new system that could equip robots with something we take for granted: the ability to link multiple senses together ...