[Cryptography] Security weakness in iCloud keychain

Kent Borg kentborg at borg.org
Tue May 8 15:01:36 EDT 2018


On 05/08/2018 02:03 PM, Ron Garret wrote:
> That’s it. We’re done here.

Let me see, how have I used passwords today?

  - unlock my phone
  - unlock my laptop
  - password over ssh to a remote machine
  - sudo password on the account above
  - password over ssh to a shared account at work
  - sudo password on the above account
  - password over ssh to a shared account on an "appliance"
  - wanting to click on a web link in an e-mail, but it will prompt me 
for a password and I never do things in that order, I manually log into 
that website (looking up the password because that one I do not 
memorize) to get a valid cookie and then I followed the link.

Six different passwords in the above.

With your tidy solution ("That's it. We're done here."), how many 
different passwords would I have typed so far today?

-kb


More information about the cryptography mailing list