[Cryptography] Security weakness in iCloud keychain
Kent Borg
kentborg at borg.org
Tue May 8 15:01:36 EDT 2018
On 05/08/2018 02:03 PM, Ron Garret wrote:
> That’s it. We’re done here.
Let me see, how have I used passwords today?
- unlock my phone
- unlock my laptop
- password over ssh to a remote machine
- sudo password on the account above
- password over ssh to a shared account at work
- sudo password on the above account
- password over ssh to a shared account on an "appliance"
- wanting to click on a web link in an e-mail, but it will prompt me
for a password and I never do things in that order, I manually log into
that website (looking up the password because that one I do not
memorize) to get a valid cookie and then I followed the link.
Six different passwords in the above.
With your tidy solution ("That's it. We're done here."), how many
different passwords would I have typed so far today?
-kb
More information about the cryptography
mailing list