SlideShare a Scribd company logo
Passwords In The Internet Age
what, how, and why - a practical guide
This presentation is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
(C) 2015 jim@openoid.net
Jim Salter
Mercenary Sysadmin,
Small Business Owner
Today's slides can be found at:
http://openoid.net/presentations/
Passwords are much, much
older than the internet.
The password was originally
only a layer of security!
… and there were severe
consequences for attackers.
We use passwords very
differently these days.
There's little or no penalty for
trying to “game” the password.
There's not even much risk of
exposure for the attacker.
The dialog we all dread
Let's talk about entropy.
Consider all the approaches
So let's get back to entropy.
www.zdnet.com/article/25-gpus-devour-password
-hashes-at-up-to-348-billion-per-second/
3.65615844×10¹ possible four-word Diceware⁵
passphrases
~~ same entropy as 8 random chars using FULL
typeable set
Offline brute force (SHA1) succeeds in 16 hours
Online brute force succeeds in 115,936 years
… at 1,000 tries/sec!
There's no WAY I can remember
so many different passwords!
Diceware makes it easier than you'd think, but
yes, you're going to need some backup.
Browser-integrated password manager? NO.
Oldschool little black book? OK, actually :)
Offline, mobile-capable manager: YES!
KeePass
But I LIKE my browser-integrated
password manager!
What happens when you don't have it available?
What if the company goes out of business?
What if a malicious site tricks it into divulging
passwords?
Keep it offline, keep it away from the web.
KeePass
Securing your secure DB
What if you forget your KeePass passphrase?
Option 1: it's just one passphrase… so, you
know, don't forget it.
Option 2: paper backup, preferably in an
extremely safe place
Keep it offline, keep it away from the web.
KeePass
Thinking in “rings”
Ring 4: “one time” signups
Ring 3: “hobby/social” sites / services
Ring 2: “professional” sites/services
Ring 1: “money” sites/services
Ring 0: primary email account
Adding Extra Layers
Two-factor authentication
Beyond Passwords
Public/Private Key Pair Encryption
Encrypt with public key
Decrypt with private key
Public key is PUBLIC!
Private key is PRIVATE!
Safely use same private
key everywhere
In The Real World
Public/Private Key Pair Encryption
Each Estonian citizen is
provided with a crypto
keypair instead of an
SSN.
The public key is printed
on their government ID.
"EST2011IDcard" by [1]. Licensed under Fair use via Wikipedia -
https://en.wikipedia.org/wiki/File:EST2011IDcard.png
Questions?
Comments?
Angry denunciations?

More Related Content

PDF
WiFi, a cautionary tale. Leakage, pwnage and just plain silliness.
ODP
A journey through an INFOSEC labyrinth
PPT
KeePass classic edition
PDF
Tutorial Keepass
PPTX
PDF
Invenio Conquer-Password-Mgmt
PPTX
KPT 6054 ANALISIS 10 JURNAL ALYA QASDINA NG AI LEE
PDF
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
WiFi, a cautionary tale. Leakage, pwnage and just plain silliness.
A journey through an INFOSEC labyrinth
KeePass classic edition
Tutorial Keepass
Invenio Conquer-Password-Mgmt
KPT 6054 ANALISIS 10 JURNAL ALYA QASDINA NG AI LEE
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...

Viewers also liked (16)

PDF
In the Wake of Ashley Madison - Jim Salter
PDF
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
PDF
ID Theft: What You Need to Know - Juliana Harris
PDF
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
PPTX
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
PDF
Software Security Assurance - Bruce Jenkins
PDF
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
PDF
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
PDF
Live Exploit - Chad Cravens
PDF
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
PPTX
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
PPTX
Keep Your Family Safe Online - Michael Kaiser
PPTX
National Cyber Security Awareness Month - Michael Kaiser
PPTX
Open Security - Chad Cravens
PPTX
Low Cost Tools for Security Challenges - Timothy De Block
PDF
Cyber Breach: A Legal Perspective - Jarrett Coco
In the Wake of Ashley Madison - Jim Salter
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
ID Theft: What You Need to Know - Juliana Harris
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
Software Security Assurance - Bruce Jenkins
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
Live Exploit - Chad Cravens
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
Keep Your Family Safe Online - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
Open Security - Chad Cravens
Low Cost Tools for Security Challenges - Timothy De Block
Cyber Breach: A Legal Perspective - Jarrett Coco
Ad

Similar to Passwords in the Internet Age - Jim Salter (20)

PPSX
Heartbleed Explained & LastPass Demo
PDF
Protecting Your Privacy: Cyberspace Security, Real World Safety
PDF
Beyond The Padlock: New Ideas in Browser Security UI
PPTX
Data Privacy for Activists
PDF
Os Nightingale
PDF
Why is password protection a fallacy a point of view
PDF
Password and Account Management Strategies - April 2019
PPT
Sept 2014 cloud security presentation
PDF
The life of breached data and the attack lifecycle
PDF
DMA - Stupid Cyber Criminal Tricks
PDF
Why is password protection a fallacy a point of view
PDF
Crypto workshop part 3 - Don't do this yourself
PDF
Mac security - a pragmatic guide
PPT
Thane Barnier MACE 2016 presentation
PPTX
Personal Internet Security System
PDF
blobargasa hahahaha foooolz gold xd lol bla
PDF
Employee Security Awareness Program
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PPTX
Cyber Security Awareness Program.pptx
PDF
Things that go bump on the web - Web Application Security
Heartbleed Explained & LastPass Demo
Protecting Your Privacy: Cyberspace Security, Real World Safety
Beyond The Padlock: New Ideas in Browser Security UI
Data Privacy for Activists
Os Nightingale
Why is password protection a fallacy a point of view
Password and Account Management Strategies - April 2019
Sept 2014 cloud security presentation
The life of breached data and the attack lifecycle
DMA - Stupid Cyber Criminal Tricks
Why is password protection a fallacy a point of view
Crypto workshop part 3 - Don't do this yourself
Mac security - a pragmatic guide
Thane Barnier MACE 2016 presentation
Personal Internet Security System
blobargasa hahahaha foooolz gold xd lol bla
Employee Security Awareness Program
An Introduction To IT Security And Privacy In Libraries & Anywhere
Cyber Security Awareness Program.pptx
Things that go bump on the web - Web Application Security
Ad

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
What is a Computer? Input Devices /output devices
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
Hindi spoken digit analysis for native and non-native speakers
What is a Computer? Input Devices /output devices
NewMind AI Weekly Chronicles - August'25-Week II
Enhancing emotion recognition model for a student engagement use case through...
cloud_computing_Infrastucture_as_cloud_p
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting started with AI Agents and Multi-Agent Systems
A novel scalable deep ensemble learning framework for big data classification...
Web App vs Mobile App What Should You Build First.pdf
1. Introduction to Computer Programming.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
O2C Customer Invoices to Receipt V15A.pptx
STKI Israel Market Study 2025 version august
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
The various Industrial Revolutions .pptx

Passwords in the Internet Age - Jim Salter

  • 1. Passwords In The Internet Age what, how, and why - a practical guide This presentation is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. (C) 2015 jim@openoid.net Jim Salter Mercenary Sysadmin, Small Business Owner Today's slides can be found at: http://openoid.net/presentations/
  • 2. Passwords are much, much older than the internet.
  • 3. The password was originally only a layer of security!
  • 4. … and there were severe consequences for attackers.
  • 5. We use passwords very differently these days.
  • 6. There's little or no penalty for trying to “game” the password.
  • 7. There's not even much risk of exposure for the attacker.
  • 8. The dialog we all dread
  • 9. Let's talk about entropy.
  • 10. Consider all the approaches
  • 11. So let's get back to entropy. www.zdnet.com/article/25-gpus-devour-password -hashes-at-up-to-348-billion-per-second/ 3.65615844×10¹ possible four-word Diceware⁵ passphrases ~~ same entropy as 8 random chars using FULL typeable set Offline brute force (SHA1) succeeds in 16 hours Online brute force succeeds in 115,936 years … at 1,000 tries/sec!
  • 12. There's no WAY I can remember so many different passwords! Diceware makes it easier than you'd think, but yes, you're going to need some backup. Browser-integrated password manager? NO. Oldschool little black book? OK, actually :) Offline, mobile-capable manager: YES! KeePass
  • 13. But I LIKE my browser-integrated password manager! What happens when you don't have it available? What if the company goes out of business? What if a malicious site tricks it into divulging passwords? Keep it offline, keep it away from the web. KeePass
  • 14. Securing your secure DB What if you forget your KeePass passphrase? Option 1: it's just one passphrase… so, you know, don't forget it. Option 2: paper backup, preferably in an extremely safe place Keep it offline, keep it away from the web. KeePass
  • 15. Thinking in “rings” Ring 4: “one time” signups Ring 3: “hobby/social” sites / services Ring 2: “professional” sites/services Ring 1: “money” sites/services Ring 0: primary email account
  • 17. Beyond Passwords Public/Private Key Pair Encryption Encrypt with public key Decrypt with private key Public key is PUBLIC! Private key is PRIVATE! Safely use same private key everywhere
  • 18. In The Real World Public/Private Key Pair Encryption Each Estonian citizen is provided with a crypto keypair instead of an SSN. The public key is printed on their government ID. "EST2011IDcard" by [1]. Licensed under Fair use via Wikipedia - https://en.wikipedia.org/wiki/File:EST2011IDcard.png