User Tools

Site Tools


passwords

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
passwords [2019/08/08 20:42] โ€“ neilpasswords [2021/07/06 09:26] (current) โ€“ external edit 127.0.0.1
Line 4: Line 4:
   * [[passwords#Use a unique email address, and a unique password, for every site and service|Use a unique email address, and a unique password, for every site and service]]   * [[passwords#Use a unique email address, and a unique password, for every site and service|Use a unique email address, and a unique password, for every site and service]]
   * [[passwords#Use a strong password|Use a strong password]]   * [[passwords#Use a strong password|Use a strong password]]
 +  * [[passwords#For mobile devices with a PIN, use an non-obvious PIN|For mobile devices with a PIN, use a non-obvious PIN]]
   * [[passwords#Use a password manager|Use a password manager]]   * [[passwords#Use a password manager|Use a password manager]]
   * [[passwords#Do not change your passwords without reason|Do not change your passwords without reason]]   * [[passwords#Do not change your passwords without reason|Do not change your passwords without reason]]
Line 9: Line 10:
   * [[passwords#Consider if biometric security is right for you|Consider if biometric security is right for you]]   * [[passwords#Consider if biometric security is right for you|Consider if biometric security is right for you]]
   * [[passwords#Wherever possible, set up two-factor authentication|Wherever possible, set up two-factor authentication]]   * [[passwords#Wherever possible, set up two-factor authentication|Wherever possible, set up two-factor authentication]]
 +  * [[passwords#Limit the locations from which you can log in|Limit the locations from which you can log in]]
  
 ====Use a unique email address, and a unique password, for every site and service ==== ====Use a unique email address, and a unique password, for every site and service ====
Line 64: Line 66:
      
 If you use a password manager, you do not need to remember the password, and you can probably cut-and-paste it into the site or service, meaning it does not matter how long it is, or if it contains a complicated spelling. If you use a password manager, you do not need to remember the password, and you can probably cut-and-paste it into the site or service, meaning it does not matter how long it is, or if it contains a complicated spelling.
 +
 +====For mobile devices with a PIN, use a non-obvious PIN ===
 +
 +If you have a mobile device with a PIN rathe than a password, do not use an obvious PIN.
 +
 +Avoid:
 +  * your birthday
 +  * your child's birthday
 +  * your wedding day
 +  * number patterns (e.g 000000, 123456, 134679)
  
 ====Use a password manager==== ====Use a password manager====
Line 73: Line 85:
 It may seem counterintuitive to write down all your passwords in one piece of software, but the [[https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers|National Cyber Security Centre's guidance]] is that the benefits outweigh the risks. It may seem counterintuitive to write down all your passwords in one piece of software, but the [[https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers|National Cyber Security Centre's guidance]] is that the benefits outweigh the risks.
  
-There are a number of different options to choose from.+There are a number of different options to choose from, depending on what features you want:ย 
 +  * [[https://1password.com|1Password]]ย 
 +  * [[https://keepass.info|KeePass]]ย 
 +  * [[https://bitwarden.com|Bitwarden]]
  
-My preference is [[http://1password.com|1Password]].+=== If your password manager is cloud-based, assess their security model ===ย 
 +ย 
 +If you are going to store all your passwords in the [[cloud|cloud]], make sure that the security the provider is offering matches the risk.ย 
 +ย 
 +===If you lose your master password, you will be locked out ===
  
 Be aware that, if you lose your master password, you are likely to be locked out of all your passwords. If you are concerned about that, you could store a copy of your master password somewhere secure, but you'd need to be very confident about the security of that storage location: if someone gets your master password, and access to your password manager, they could get all your passwords. Be aware that, if you lose your master password, you are likely to be locked out of all your passwords. If you are concerned about that, you could store a copy of your master password somewhere secure, but you'd need to be very confident about the security of that storage location: if someone gets your master password, and access to your password manager, they could get all your passwords.
Line 102: Line 121:
 ===Fingerprint / face recognition / biometric unlock=== ===Fingerprint / face recognition / biometric unlock===
  
-Fingerprint or facial recognition unlocking can be convenient, fast, and not something which can be detected by just looking over your shoulder as you enter it into the phone.+Fingerprint or facial recognition unlocking can be convenient, fast, and not something which can be detected by just looking over your shoulder as you enter it into the phone. ย 
 +ย 
 +Before using facial recognition, assess whether it can be fooled by the use of a photograph or video or mask.
  
 In some jurisdictions, it appears that one cannot be forced to disclose a password, but can be asked to place a finger on a device to unlock it. If in doubt, you might consider disabling fingerprint unlock for the duration of a trip into such a country. In some jurisdictions, it appears that one cannot be forced to disclose a password, but can be asked to place a finger on a device to unlock it. If in doubt, you might consider disabling fingerprint unlock for the duration of a trip into such a country.
  
 Depending on the outcome of your [[threat_modelling|threat modelling]], you may decide that the convenience is an acceptable compromise. Depending on the outcome of your [[threat_modelling|threat modelling]], you may decide that the convenience is an acceptable compromise.
 +
 +===You cannot change your face or fingerprints ===
 +
 +You should use a different username and password for every account or service you use.
 +
 +Clearly, you cannot do this for biometrics (well, not beyond 10, in the case of most people, when it comes to finger/thumb prints).
 +
 +Moreover, you cannot realistically change your face, if an insecure storage of biometric credentials is compromised.
 +
 +
 +===Disable them in higher-risk situations ===
  
 You might also decide to use these unlock mechanisms most of the time, but disable them for certain activities (e.g. for travelling across borders). You might also decide to use these unlock mechanisms most of the time, but disable them for certain activities (e.g. for travelling across borders).
Line 114: Line 146:
 ===Swipe patterns=== ===Swipe patterns===
 Even with the Android swipe pattern unlock mechanism, it is pretty easy to watch someone do a basic pattern once and replicate it โ€” so you need to go for something pretty complicated, coupled with shielding your phone when you enter your passcode. Even with the Android swipe pattern unlock mechanism, it is pretty easy to watch someone do a basic pattern once and replicate it โ€” so you need to go for something pretty complicated, coupled with shielding your phone when you enter your passcode.
 +
 +Swiping may also leave a greasy mark on your screen, which someone could use to determine the pattern you are using.
  
 In addition, a swipe pattern could be readily compromised if you are observed by nearby security cameras. In addition, a swipe pattern could be readily compromised if you are observed by nearby security cameras.
Line 120: Line 154:
  
 See [[two-factor_authentication|two-factor authentication]]. See [[two-factor_authentication|two-factor authentication]].
 +
 +====Limit the locations from which you can log in ====
 +
 +If you can feasibly do so, restrict logins so that you can only log in from certain networks or IP address ranges. 
 +
 +If, for example, you always connect via a [[virtual_private_networks|VPN]], you could restrict logins to the IP address ranges used by your VPN.
 +
 +Someone who is not connected via the same network should not be able to log in, even if they know your username and password. If, however, the attacker is someone within your organisation, and has access to the same networks / IP address ranges, this control is likely to be ineffective.
 +
 +If you do this, you need to accept that risk that, if you cannot connect to your VPN, or if your VPN endpoint's IP address ranges change, you will not be able to log in.
passwords.1565296931.txt.gz ยท Last modified: 2021/07/06 09:26 (external edit)