[Cryptography] bad advice, was New SSL/TLS certs
Kent Borg
kentborg at borg.org
Tue Apr 22 09:02:02 EDT 2025
On 4/21/25 7:15 PM, John Levine wrote:
> No, that's not the reason. Endless failures have told us that trying
> to train users just does not work.
We have never tried.
First there /is/ a powerful contingent that insists that only a
technical solution is acceptable and it is wrong to try to educate.
Literally, I have heard this argument repeatedly, they call any
education blaming the user. Trying to teach people to swim when there is
a crowd screaming that swimming is impossible is hard.
Second, when we have tried to educate we have done it terribly. One job
I had, at a company with almost all technical employees, spent a lot of
money for some fancy training program for new hires about phishing, and
it was entirely based on superficial aspects of e-mails, things like how
good the spelling is or whether there was a contrived urgency. Never did
they mention things like "Where did the e-mail come from, is it where
the e-mail pretended to come from?" or "Do the links in the e-mail match
the purported sender?". Never did they advise to not enter
authentication credentials in response to a link in an e-mail, to
instead log into the account in question using a known good URL, and
then click in the e-mail link that pretends to be for that account.
But they could /not/ train on these aspects, because the company itself
sent legitimate e-mails that looked like phishing. They hired services
that sent e-mail to new hires that pretended to be from one entity but
were sent by another. And they sent e-mails where there was no way to
independently login other than via the link in the e-mail.
I currently have at least one account with a bank that sends me e-mails
where I have no choice but to type login credentials in response to an
e-mailed link.
We are doing anti-training by sending non-phishing e-mail that looks
like phishing.
Third, even if we had done some decent user education, it would take
time and would be imperfect…handy excuses for arguing "just does not work".
Building insecure systems is /profitable/. Companies that have had
/massive/ breaches only have little blips in their business. Look at
Crowdstrike, did their failure last July hurt their stock price for more
than a few weeks? No! Of course user education isn't important enough to
actually do.
-kb
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20250422/da00e691/attachment.htm>
More information about the cryptography
mailing list