MS Research: heretical views on re-using passwords & password managers

Options
Stephen_C
Stephen_C
Community Member

This is a link to a "Guardian" article in the UK which reveals what some might consider heretical advice about password use and password managers coming from researchers at Microsoft & Carelton University in Canada. (You might imagine that, as an OS X and 1Password user, I'm not particularly impressed by the advice. ;) but you might find it interesting.)

theguardian.com/technology/2014/jul/16/microsoft-stop-using-strong-passwords-everywhere

Stephen

Comments

  • Hero Jig
    Hero Jig
    Community Member
    Options

    I too read this today in the Guardian, and would like to know Agilebit's public response to the suggestions there...

  • MrC
    MrC
    Volunteer Moderator
    edited July 2014
    Options

    That research is full of invalid assumptions.

    It assumes, for example, that users can differentiate between high-risk and low-risk sites. As sites often ask for additional information over time, users must then re-evaluate a site's level of risk. And given the permanent nature of collected data, and difficulty finding the total corpora of data a site has collected, this is no easy task. They make clear: "Far from optimal outcomes will result if accounts are grouped arbitrarily." Can anyone imagine users looking at their, say, 100 login records, for example, and assigning them to high or low risk groups, at all, or ever reliably and effectively?

    It also assumes users have a built-in understanding of how collected data can be maliciously used.

    In the second sentence of the abstract, it incorrectly posits the biased position that "passwords with no re-use gives users an impossible task as portfolio size grows."

    They use some broken or flawed password management implementations and strategies as the basis for throwing the baby out with the bathwater. And build their thesis from that (invalid) position (users probably should not or will not use password management software).

    They use unmeasured risk threats and promote them into measured, known risk values that should be avoided at all costs. Its almost like saying "a fire burned down my neighbors house (because he left his lit candle next to the Christmas tree), so we should not build any wood houses."

    Their concluding remarks show how simple their suggested strategy is:

    This suggests simple guidelines, such as: if Pi is similar across accounts, then optimal grouping will put high-value accounts in smaller (or singleton) groups, and low-value accounts in larger groups.

  • khad
    khad
    1Password Alumni
    Options

    I think our most recent blog post has a pretty good explanation of our perspective on this topic, but I'd love to know if there are specific questions you folks still think are unanswered after reading it:

    1Password is a very safe basket

This discussion has been closed.