
2025-08-07 07:04:26
https://blog.danielh.cc/blog/passwords
“Please stop”
We replaced passwords with something worse
https://blog.danielh.cc/blog/passwords
“Please stop”
We replaced passwords with something worse
PSA #Tangerine now supports proper passwords, in case you didn't like your whole banking being protected by 6 digits
#banking
Dropbox says it will discontinue Dropbox Passwords, launched in 2020, on October 28 to focus on its core product, and recommends 1Password as a replacement (Richard Speed/The Register)
https://www.theregister.com/2025/07/30/dropbox_drops_dropbox_passwords/
No, Google did not warn 2.5 billion Gmail users to reset passwords
https://www.bleepingcomputer.com/news/technology/no-google-did-not-warn-25-billion-gmail-users-to-reset-passwords/
Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web Browsers
Anuj Gautam, Tarun Yadav, Garrett Smith, Kent Seamons, Scott Ruoti
https://arxiv.org/abs/2509.02289
Keeping screens out of bedrooms, talking, and learning how to manage passwords together are three ways you can help your child build healthy and safe online habits.
https://theprivacydad.com/three-tips-for-parents-to-help-your-chi…
Done for today. I successfully disconnected one of my Google profiles from the third-party services I use. It took some time because I had to create many passwords and then disconnect.
I also deleted several services I no longer use and switched from Gmail to privacy-focused email addresses.
Continuing tomorrow.
#degoogle
Password compromise is no joke;
it leads to account compromise and that leads to, well, the compromise of most everything you hold dear in this technological-centric world.
It’s why Google is telling billions of users to replace their passwords with more secure passkeys.
It’s why the FBI is warning people not to click on links in SMS messages.
It’s why stolen passwords are up for sale, in their millions, on the dark web to anyone with the very little amount of cas…
@… I kind of agree. I don’t like that you have to have software that knows who you are to use the web (or a device that does, on the side). But I also don’t see any feasible alternative.
Shared passwords (which I believe are still the majority of them) are terrible. I think I am slightly on the side of DRM.
passwords for positive change
#inspiration #BeBetter
https://muz4now.com/2014/passwords-pos
Secure Password Generator Based on Secure Pseudo-Random Number Generator
Abel C. H. Chen
https://arxiv.org/abs/2509.02578 https://arxiv.org/pdf/2509.02578
Es gibt anscheinend einen klitzekleinen #Datenreichtum, 16 Mrd. #Passwörter geleakt.
A Fuzzy Set-based Approach for Matching Hand-Drawing Shapes of Touch-based Gestures for Graphical Passwords
Adel Sabour, Ahmed Gadallah, Hesham Hefny
https://arxiv.org/abs/2507.22382
BeCyberSmart: How Fast Can a Hacker Break YOUR Password? | Oberlin College and Conservatory
https://www.oberlin.edu/cit/bulletins/passwords-matter
Dropbox telling people they have 3 months to get off Dropbox Passwords is pretty weak sauce.
Quantum Adiabatic Generation of Human-Like Passwords
Sascha M\"ucke, Raoul Heese, Thore Gerlach, David Biesner, Loong Kuan Lee, Nico Piatkowski
https://arxiv.org/abs/2506.08917
Zeroize: The Tiny and Memory-Safe Rust Crate - Sensitive Data in Memory: A Hidden Threat
In a secure environment, one of the most overlooked threats is the presence of sensitive data in memory, such as passwords, tokens, cryptographic keys, or card numbers. Even when using Rust, where we emphasize ownership and thread safety, there's another crucial question to consider: What remains in the heap or stack after we no longer need it?
🛡️
Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
https://techcrunch.com/2025/07/02/data-breach-reveals-catwatchful-stalkerware-spying-on-thousands-android-phones/
DHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access FEMA networks (David DiMolfetta/Nextgov/FCW)
https://www.nextgov.com/people/2025/08/noe
Big password leak. Change your passwords for google, Facebook, GitHub, etc right now, and turn on 2FA
Forget password leaks, how about a website that has every combination of every 4-32 character passwords. (347,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 (or 347 novemdecillion))
https://solst-ice.github.io/every-pass…
My whole extended family is using me as their Password Manager. Calling me for random passwords we've set up together ages ago. 🙈
Lawsuit says Clorox hackers got passwords simply by asking
https://www.reuters.com/legal/government/lawsuit-says-clorox-hackers-got-passwords-simply-by-asking-2025-07-22/
Overblown or not, it's always a good time to update your passwords. I just went through and did everything that would severely fuck my life https://flipboard.com/@gizmodo/tech-fknh6odjz/-/a-m0vsrs-YTqqjU9-Hb98ylg:a:1876139665-/0…
> She explained, “I just need the paper. I need to write things down. [The iPad script] also has so many passwords and then I would have ADD and then do something else and then it would lock me out … it was so complicated. So I printed it.”
When actors bypass corporate controls to get their work done, it's a showbiz story.
Cool, Neuralink might soon be able to read passwords from your brain - what could possibly go wrong? https://www.nytimes.com/2025/08/14/science/brain-neuroscience-computers-speech.html NYT: For some patients, the 'inner voice' may soon be audi…
Hybrid Classical-Quantum Rainbow Table Attack on Human Passwords
MA. Khajeian
https://arxiv.org/abs/2507.14600 https://arxiv.org/pdf/…
Sorry, but this was never going to last. Sharing passwords & now VPN-access to intl video catalogs.
☑️ Some UK users on r/YouTube report that VPNs are being blocked by the platform
https://twitter.com/Awk20000/status/1952425053813141666
Haptic-Based User Authentication for Tele-robotic System
Rongyu Yu, Kan Chen, Zeyu Deng, Chen Wang, Burak Kizilkaya, Liying Emma Li
https://arxiv.org/abs/2506.14116
Cannon Fodder: wayward roofs
I deliberated for far too long there whether the plural was roof or rooves. I have played Cannon Fodder many times before. I think, but I can't actually remember, that I completed it on the Mega Drive; I certainly got pretty far, but without unearthing the cartridge (and the passwords in the manual) from my loft I can't be sure. I have also played it on an Amiga emulator, but my preferred method nowadays is via the GOG copy I bought for…
Make sure you check out today's Metacurity for the most critical infosec developments you should know, including
--US agency overseeing cache of nuclear weapons was breached in SharePoint attack,
--Funding for critical infrastructure cyber threat detection has expired,
--Iranians received Apple spyware warnings,
--OpenAI founder warns of AI fraud crisis,
--Clorox claims IT provider gave hackers employee passwords,
--Feds warn of Interlock ransomware.
A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors https://www.404media.co/a-startup-is-selling-data-hacked-from-peoples-computers-to-debt-collectors/
https://www.nextgov.com/people/2025/08/noem-terminates-24-fema-workers-failing-address-cyber-vulnerabilities/407807/
Noem terminates 24 FEMA workers for failing to address cyber vulnerabilities
Each week, Metacurity offers our free and paid subscribers a run-down of the best infosec-related long reads.
This week's selection covers
--A twisted tale of how two men tortured someone for his crypto account passwords,
--Russia's cyber sector supports Putin's Ukraine war,
--A brain-reading implant requires a password,
--Social media algorithms didn't cause America's woes,
--The internet is really bad for children,
--More
…
The Passwordless Authentication with Passkey Technology from an Implementation Perspective
Lien Tran, Boyuan Zhang, Ratchanon Pawanja, Rashid Hussain Khokhar
https://arxiv.org/abs/2508.11928
Detecting Hard-Coded Credentials in Software Repositories via LLMs
Chidera Biringa, Gokhan Kul
https://arxiv.org/abs/2506.13090 https://
Detecting Hard-Coded Credentials in Software Repositories via LLMs
Chidera Biringa, Gokhan Kul
https://arxiv.org/abs/2506.13090 https://
Towards Practical Data-Dependent Memory-Hard Functions with Optimal Sustained Space Trade-offs in the Parallel Random Oracle Model
Jeremiah Blocki, Blake Holman
https://arxiv.org/abs/2508.06795