Skip to main content

Thoughts on Passwords

Passwords are the key to internet security.  People need one to log into their bank, their email, their computer, their phone, any website where they can buy things and any website where companies want to track them.  Email address and password is the standard to get access and it is useless.  It is useless because emails are public.  Everyone knows everyones email address.  Any app, like Facebook, has access to the contact list, so it knows all a person's friends emails.  Passwords are difficult to remember, difficult to create and so people just use something simple or use the same password everywhere.

Many websites give requirements for passwords, like “1 capital letter and 1 number and 1 symbol,” so people take normal dictionary words and remace letters with numbers and then promptly forget what they created.  Companies have to store passwords somewhere and when they are hacked,  and some Russian gets 2 million user names, passwords and credit card numbers from Home Depot or Target or some other company that is more interested in selling things than security.  If a person uses the same password everywhere then the person who hacked Home Depot can now get into that person’s bank account.

Biometrics are a different way to improve the passwords system.  On phones and computers, people can unlock their devices with a thumb or finger print.  People joke that all a hacker has to do it cut off your finger.  Retina scans are coming and Apple claims to have a “face recognician” system that is unbeatable.  We will see.

Two-factor or two-part authetication is also a security measure.  With two-factor a person uses something they know and something they have.  For example, logging in with two-factor to a bank’s website means that the user enters their email and password (somthing they know).  The bank then texts them a series of digits that they must enter (something they have).  So a hacker must know a person’s user name and password and have their phone.  This makes it more difficult since hackers cannot get all this information by hacking the bank’s website.

Steve Gibson is working on a new login procedure called SQRL, which relies on QR codes for logging into sites.  It claims to be the most secure login out there.  Of course banks and stores must use this system and rewrite their login procedures on their website for this to work.  At least people are thinking about this and trying to improve the system.

If it is online, it will be hacked, spied on, confiscted and searched, wether by evil hackers, or the government.  Anything that is stored online must be secure in both encryption and in standing against government intrusion.  Email and password logins are antiquated, unsecured and dangerous.  Two-factor systems add a level of security but are cumbersom.  Password managers like 1Password and LastPass generate and store very long, comlicated passwords, but that just means they cannot be guessed.  They can still be hacked.  We are a long way from a secure internet, so be very careful what you store in the cloud.

Comments

Popular posts from this blog

Remembering the Franklin Day Planner

This week I have been rereading Hyrum Smith's book "The 10 Natural Laws of Productivity and Happiness." This book was written in the late 1980s and I remember reading it for the first time when I was working at Seagate Technologies, after my time in the Air Force. The core tool talked about in the book is the Franklin Day Planner . I remembering having one such planner, long before smart phones and Palm devices. Mine was a leather bound loose-leaf binder with calendar and note pages in it. I kept my daily tasks list and appointments in that binder, which became a record of my work history at Seagate and beyond. The Day Planner binders, pages and supplies were sold at a store called Franklin Quest , which was located at Valco Mall in Sunnyvale. At that time, I was a computer programmer. I was able to keep a record of all request for software, who made the request and when and what the requirements were. It seemed that I was the only one keeping a record of this b...

What do I preach?

I preach the Word of God.  The style I use is called expositional exegetical .  I draw the meaning out of the Scripture and explain it.  I believe this is the only approved type of preaching.  To preach events out of the newspaper or the latest psychology fad does nothing to edify the saints or glorify God and certainly it does not contain the power to save. The context for my preaching is that I preach through books of the Bible.  Most recently I have been preaching through the gospel of John.  I started in John 1:1 and last Sunday I preached through John 21:15-17.  Charles Spurgeon preached through the entire Bible, but did not take the verses in order.  He bounced around, and got through the entire Bible. One of the most popular styles of preaching in large churches or churches that want to be large is a style called “topical.”  Traditionally topical preaching takes a topic that is from the news or something that the pastor is reading....

Thoughts on God Speaking

God speaks.  Not often, in an audible voice from the sky, but he does speak.  In the Bible he spoke with a voice, he showed pictures and visions and dreams to people.  Today people speak of impressions in their spirit or mind, which was not talked about in the Bible. Today, I believe that people claim God speaks much more than he does.  The primary reason I say this is that God does not need to speak at all.  God has said all that is needed in his Word, the Bible.  We have everything that is required for life and godliness in the pages of our Bibles.  Bibles are not hard to get, except in anti-God countries, yet we still manage to smuggle them into every country and people group.   For those that claim God is a veritable chatterbox I have to wonder what value that brings to their life.  People who claim to hear God’s voice all the time do not seem to have greater biblical understanding.  In fact, people who hear God’s voice all ...