On Tue, 18 Dec 2012 17:40:24 +0100, Cédric Beust ♔ <[email protected]>
wrote:
This is another aspect of security that very few people realize: using
different passwords on different sites don't make you as safe as you
think.
Your single point of failure is your email account, period. Once a hacker
gets access to your email, they can reset pretty much every single other
account that you own, regardless of how many different passwords you use
for those.
True. But e.g. the procedure for resetting the password to my banks aren't
as easy - they also require some other proof, such as other "secret
information" that has been previously shared, and they involve some phone
call. Still, this can be hacked. The think that people should do (and I've
only partially done, but I'll fill the gap ASAP) is to have a short
security assessment of the accounts and their recovery procedures. Then
you can try to compare it with e.g. the breach reported by Wired. BTW, if
I remember well, Apple was doing something very stupid in the reset
procedure, and that's why no major corporate will ever have my primary
credit card numbers (for them I use a PayPal card with a very tight credit
cap).
It isn't particularly hard, I think that you need just to classify two
levels: one for the bank accounts and all the thing that can cause serious
damage, and the other for all the rest. Then use separate emails. I'm
considering to use, for the first class, the "certified email" that has
become obligatory by law in many countries. Not only the provider
guarantees signing, timestamping and archival (which means it would be
easy to reconstruct an incident, and even proof it), but it's used very
seldom, just for some perodic communications with state agencies and such
(at least in my case). For instance, this means that I don't have
configured my smartphone to connect with it.
I was going to add that some well designed reset procedures make use of
SMS notifications (e.g. banks), but in this case the smartphone can be
again a single point of failure and some malicious app could hack them.
--
Fabrizio Giudici - Java Architect @ Tidalwave s.a.s.
"We make Java work. Everywhere."
http://tidalwave.it/fabrizio/blog - [email protected]
--
You received this message because you are subscribed to the Google Groups "Java
Posse" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to
[email protected].
For more options, visit this group at
http://groups.google.com/group/javaposse?hl=en.