Difference between revisions of "1820: Security Advice"

Explain xkcd: It's 'cause you're dumb.
Jump to: navigation, search
(Security tips)
(Explanation)
(31 intermediate revisions by 19 users not shown)
Line 8: Line 8:
  
 
==Explanation==
 
==Explanation==
 +
This is another one of [[Randall|Randall's]] [[:Category:Tips|Tips]], this time a list of security tips.
 +
 
The comic depicts a conversation between [[Cueball]] and [[Ponytail]], discussing the fact that giving people security advice in the past has failed to improve their internet security, and in some cases even made things worse.  One such example is telling people to create complicated passwords containing numbers and symbols, which not only made the passwords harder to remember (leading people to create huge security risks by [https://arstechnica.com/security/2015/04/hacked-french-network-exposed-its-own-passwords-during-tv-interview/ leaving post-it notes with their passwords on their computer monitor]), but did not actually make those passwords harder to crack (see [[936: Password Strength]]).
 
The comic depicts a conversation between [[Cueball]] and [[Ponytail]], discussing the fact that giving people security advice in the past has failed to improve their internet security, and in some cases even made things worse.  One such example is telling people to create complicated passwords containing numbers and symbols, which not only made the passwords harder to remember (leading people to create huge security risks by [https://arstechnica.com/security/2015/04/hacked-french-network-exposed-its-own-passwords-during-tv-interview/ leaving post-it notes with their passwords on their computer monitor]), but did not actually make those passwords harder to crack (see [[936: Password Strength]]).
  
 
As a result, Cueball suggests using {{w|reverse psychology}} and give out bad advice instead, in hopes of achieving a positive effect. The last panel contains a list with 13 security tips, which are parodies of actual security tips. The title text is just one more tip. See [[#Security tips|table]] below for explanations for all 14 tips.
 
As a result, Cueball suggests using {{w|reverse psychology}} and give out bad advice instead, in hopes of achieving a positive effect. The last panel contains a list with 13 security tips, which are parodies of actual security tips. The title text is just one more tip. See [[#Security tips|table]] below for explanations for all 14 tips.
 
This comic is yet another [[:Category:Tips|tips comic]].
 
  
 
===Security tips===
 
===Security tips===
Line 23: Line 23:
 
|- id="tip1"
 
|- id="tip1"
 
|Don't click links to websites
 
|Don't click links to websites
|The usual tip is "Don't click on ''suspicious'' website links" or "Don't click any links in suspicious emails". The comic's variation instead tells users not to click on any links to any websites, which essentially stops them from using the World Wide Web altogether. So this tip is not really helping, as the opposite of this would be to click on all links.
+
|The usual tip is "Don't click on ''suspicious'' website links" or "Don't click any links in suspicious emails". The comic's variation instead tells users not to click on any links to any websites, which essentially stops them from using the World Wide Web altogether. So this tip is not really helping, as the opposite of this would be to click on all links. [https://www.sketchywebsite.net This is an example website that showcases an extreme example of what ''could'' (probably wouldn't (this is not advice)) happen if you clicked on a suspicious link.]
 
|- id="tip2"
 
|- id="tip2"
 
|Use prime numbers in your password
 
|Use prime numbers in your password
Line 32: Line 32:
 
|- id="tip4"
 
|- id="tip4"
 
|Hold your breath while crossing the border
 
|Hold your breath while crossing the border
|At some border crossings, government agents may search computers, cell phones, and other electronic devices.  The usual advice for such situations ranges from asserting your rights to resetting all devices and deleting all data prior to crossing a border.  Holding one's breath can potentially prevent inhaling germs or poisons in some situations, though useless in the context of computer security.  These two topics mixed in the same advice won't achieve anything, but if you hold your breath for too long you could pass out when crossing, or look stressed/suspicious and invite even more scrutiny. This could also be a reference to the superstition of holding one's breath when passing a graveyard, or similarly to the movie {{w|Spirited Away}}, where the main character is instructed to hold her breath while crossing the bridge that acts as the border between the human and spirit world. In any case, holding one's breath while browsing the Internet would have no useful effect, supernatural or otherwise.
+
|At some border crossings, government agents may search computers, cell phones, and other electronic devices.  The usual advice for such situations ranges from asserting your rights to resetting all devices and deleting all data prior to crossing a border.  Holding one's breath can potentially prevent inhaling germs or poisons in some situations, though useless in the context of computer security.  These two topics mixed in the same advice won't achieve anything, but if you hold your breath for too long you could pass out when crossing, or look stressed/suspicious and invite even more scrutiny. This could also be a reference to the superstition of holding one's breath when passing a graveyard, or similarly to the movie ''{{w|Spirited Away}}'', where the main character is instructed to hold her breath while crossing the bridge that acts as the border between the human and spirit world. In any case, holding one's breath while browsing the Internet would have no useful effect, supernatural or otherwise.
 
|- id="tip5"
 
|- id="tip5"
 
|Install a secure font
 
|Install a secure font
Line 40: Line 40:
 
|{{w|Multi-factor authentication|Two factor authentication}} describes the practice of using two different identification factors (such as a password and a code from a secure token) to authenticate the user. A two factor smoke detector presumably uses two or more factors to identify ''smoke'' (such as {{w|Smoke_detector#Ionization|ionization}} and {{w|Smoke_detector#Photoelectric|photoelectric}}). Such devices [https://alarmspecs.com actually exist], but, while improving the user's general safety, they do nothing to improve their internet security.
 
|{{w|Multi-factor authentication|Two factor authentication}} describes the practice of using two different identification factors (such as a password and a code from a secure token) to authenticate the user. A two factor smoke detector presumably uses two or more factors to identify ''smoke'' (such as {{w|Smoke_detector#Ionization|ionization}} and {{w|Smoke_detector#Photoelectric|photoelectric}}). Such devices [https://alarmspecs.com actually exist], but, while improving the user's general safety, they do nothing to improve their internet security.
  
Also, the logic behind using two-factor authentication is that '''both''' types of credentials must match to grant access. Smoke detectors work otherwise - usually firing if '''any''' of the sensors detect a fire. If the smoke detector worked according to the authentication logic it will be less likely to detect smoke, effectively lessening fire safety as compared to a single sensor one.
+
<!-- Previously, this row argued:
 +
"Also, the logic behind using two-factor authentication is that '''both''' types of credentials must match to grant access. Smoke detectors work otherwise - usually firing if '''any''' of the sensors detect a fire. If the smoke detector worked according to the authentication logic it will be less likely to detect smoke, effectively lessening fire safety as compared to a single sensor one."
  
 +
That analysis is not correct, because detection is not binary, it involves thresholds. A smoke detector with two independent detection mechanisms can lower the threshold of one or both mechanisms in combination with the other, adjusting the likelihood of detection and the confidence of each detection. With any detector there is a tradeoff between nuisance tripping and detection failure. A dual function detector allows those tradeoffs to be made in two dimensions and not just one, and is not inherently more prone to nuisance tripping.  And all that assumes the mechanisms are functioning as AND, which does not seem to be a requirement put forth in the comic. ~~~~
 +
 +
-->
 
A month before this comic the newest [[:Category:xkcd Phones|xkcd Phone]], [[1809: xkcd Phone 5]], was released with a 28-factor authentication.
 
A month before this comic the newest [[:Category:xkcd Phones|xkcd Phone]], [[1809: xkcd Phone 5]], was released with a 28-factor authentication.
 
|- id="tip7"
 
|- id="tip7"
 
|Change your maiden name regularly
 
|Change your maiden name regularly
|Your maiden name is the family name with which you were born. Literally changing your maiden name, is impossible by the definition of "maiden name". A common tip is to change your passwords regularly. Some password recovery procedures ask for a security question, like "what is your {{w|Maiden and married names|maiden name}}" Maiden names and other trivia typically asked by security questions are not secret, so they are inherently insecure.
+
|A {{w|maiden name}} is the family name that a woman has at birth. (The gender-neutral term is "birth name" or "birth surname"; it is unclear whether this "advice" is meant to apply only to women.) Security experts frequently criticize the concept of security questions like "what is your mother's maiden name?", on the basis that they can often be deduced from publicly available information. In the sense that it refers to a historical fact, a maiden name cannot be changed retroactively, although in the sense that it refers to the last name on one's birth certificate, in some narrow cases this ''can'' be amended. For instance, when someone is {{w|adoption|adopted}} and takes their adoptive parent's last name, in many jurisdictions a {{w|legal fiction}} holds that they have had that last name since birth, and governments will issue new birth certificates to that effect. However, it is unlikely for anyone to be able to amend the surname on their birth certificate more than once, and impossible to do so "regularly".
  
 
A real tip for dealing with security questions is to enter false data.
 
A real tip for dealing with security questions is to enter false data.
Line 53: Line 57:
 
|- id="tip9"
 
|- id="tip9"
 
|Use special characters like & and %
 
|Use special characters like & and %
|You can use special characters to increase the entropy/strength of your password, though as describe in [[936: Password Strength]], that often leads to passwords that are hard to remember but not particularly strong.  The password context is missing here, and in everyday situations the characters & and % are not special. These two characters are often disallowed in passwords because of their relevance to {{w|SQL}} (a common database query language). If these characters were used in a password, a badly written security system using SQL could have severe bugs (and security vulnerabilities) similar to the security flaw in [[327: Exploits of a Mom]].
+
|You can use special characters to increase the entropy/strength of your password, though as described in [[936: Password Strength]], that often leads to passwords that are hard to remember but not particularly strong.  The password context is missing here, and in everyday situations the characters & and % are not special. These two characters are often disallowed in passwords because of their relevance to {{w|SQL}} (a common database query language). If these characters were used in a password, a badly written security system using SQL could have severe bugs (and security vulnerabilities) similar to the security flaw in [[327: Exploits of a Mom]].
 
|- id="tip10"
 
|- id="tip10"
 
|Only read content published through Tor.com
 
|Only read content published through Tor.com
Line 59: Line 63:
 
|- id="tip11"
 
|- id="tip11"
 
|Use a burner's phone
 
|Use a burner's phone
|A play on using a {{w|Prepay mobile phone|burner phone}} (a cheap/disposable cell phone like those purchased at 7-11, often used for drug deals or other activity one might not want traced), and using the cell phone of a burner, i.e. a person who habitually uses marijuana (or, less likely, a person who goes to the {{w|Burning Man|Burning Man festival})}.
+
|A play on using a {{w|Prepay mobile phone|burner phone}} (a cheap/disposable cell phone like those purchased at 7-11, often used for drug deals or other activity one might not want traced), and using the cell phone of a burner, i.e. a person who habitually uses marijuana (or, less likely, a person who goes to the {{w|Burning Man|Burning Man festival}}).
 
|- id="tip12"
 
|- id="tip12"
 
|Get an SSL certificate and store it in a safe place
 
|Get an SSL certificate and store it in a safe place
Line 65: Line 69:
 
|- id="tip13"
 
|- id="tip13"
 
|If a border guard asks to examine your laptop, you have a legal right to challenge them to a chess game for your soul.
 
|If a border guard asks to examine your laptop, you have a legal right to challenge them to a chess game for your soul.
|This tip is a reference to the common trope [http://tvtropes.org/pmwiki/pmwiki.php/Main/ChessWithDeath Chess with Death], in which a mortal challenges a god to a game or challenge, often for their life. This version of the trope traces back to {{w|Ingmar Bergman|Ingmar Bergman's}} film {{w|The Seventh Seal}}, in which the protagonist {{w|The Seventh Seal#Synopsis|challenges Death}} to a game of chess. But instead of avoiding death, this tip suggests you have the right to do the same to get out of handing your devices over to a border guard. (This trope is also featured in [http://www.explainxkcd.com/wiki/index.php/393 393: Ultimate Game]).  
+
|This tip is a reference to the common trope {{tvtropes|ChessWithDeath|Chess with Death}}, in which a mortal challenges a god to a game or challenge, often for their life. This version of the trope traces back to {{w|Ingmar Bergman|Ingmar Bergman's}} film {{w|The Seventh Seal}}, in which the protagonist {{w|The Seventh Seal#Synopsis|challenges Death}} to a game of chess. But instead of avoiding death, this tip suggests you have the right to do the same to get out of handing your devices over to a border guard. (This trope is also featured in [http://www.explainxkcd.com/wiki/index.php/393 393: Ultimate Game]).  
 
+
Under President {{w|Donald Trump}} (inaugurated two and a half months prior to this comic), border patrol and customs agents have become notorious for profiling non-Caucasian travelers and immigrants. Stories abound of agents coercing and threatening travelers to hand over their smartphones -- they do not have legal right to just take your devices under the Fourth Amendment, but have many not-entirely-idle threats they can level at you until you do as they wish.
This is the second tip referring to crossing a border.
+
 +
This is the second tip referring to crossing a border. Randall has made several comics lately that could be seen as being related to issues concerning the election of Donald Trump as president - see more [[Sad comics|here]].  
 
|- id="tip14"
 
|- id="tip14"
 
|'''Title Text''': Never give your password or bank account number to anyone who doesn't have a blue check mark next to their name.  
 
|'''Title Text''': Never give your password or bank account number to anyone who doesn't have a blue check mark next to their name.  
|The usual security tip here is ''"only trust Twitter accounts claiming to be legitimate if they have a blue check mark next to their name"'', which means that the account is verified as legitimate. This tip suggests only giving your ''password'' to verified accounts, although you shouldn't give your password to ''any'' account. It also refers to problems especially visible in the US banking system, where there is very little security for direct account drafts, and because of that it is advised there to keep the account number as secret as possible. In contrast, in Europe giving your account number to someone is one of the most common ways to get paid.
+
|The usual security tip here is ''"only trust Twitter accounts claiming to be legitimate if they have a blue check mark next to their name"'', which means that the account is verified as legitimate. This tip suggests only giving your ''password'' to verified accounts, although you shouldn't give your password to ''any'' account. Twitter Verification would be revisited in [[1914: Twitter Verification]].
 +
 
 +
It also refers to problems especially visible in the US banking system, where there is very little security for direct account drafts, and because of that it is advised there to keep the account number as secret as possible. In contrast, in Europe giving your account number to someone is one of the most common ways to get paid.
  
A related tip might be ""Never give your password or bank details to a website that doesn't have a padlock icon next to the URL"". In some browsers, if you access a secure website, there will be a padlock icon in the browser indicating you've connected to a secure website using the secure https protocol.  So this tip treats the verified account icon the same way you might treat a secure website icon.
+
A related tip might be "Never give your password or bank details to a website that doesn't have a padlock icon next to the URL". In some browsers, if you access a secure website, there will be a padlock icon in the browser indicating you've connected to a secure website using the secure https protocol.  It doesn't provide that it is not malicious site, and that is secure to enter.  So this tip treats the verified account icon the same way you might treat a secure website icon.
 
|}
 
|}
  

Revision as of 09:25, 11 June 2022

Security Advice
Never give your password or bank account number to anyone who doesn't have a blue check mark next to their name.
Title text: Never give your password or bank account number to anyone who doesn't have a blue check mark next to their name.

Explanation

This is another one of Randall's Tips, this time a list of security tips.

The comic depicts a conversation between Cueball and Ponytail, discussing the fact that giving people security advice in the past has failed to improve their internet security, and in some cases even made things worse. One such example is telling people to create complicated passwords containing numbers and symbols, which not only made the passwords harder to remember (leading people to create huge security risks by leaving post-it notes with their passwords on their computer monitor), but did not actually make those passwords harder to crack (see 936: Password Strength).

As a result, Cueball suggests using reverse psychology and give out bad advice instead, in hopes of achieving a positive effect. The last panel contains a list with 13 security tips, which are parodies of actual security tips. The title text is just one more tip. See table below for explanations for all 14 tips.

Security tips

Security Tip Explanation
Print out this list and keep it in your bank safe deposit box (header) This is a standard recommendation for documents that must be kept secure because they are irreplaceable and/or contain sensitive information. However this list itself is easily replaceable and the contents will be well-known, so storing it in a safe place is totally unnecessary. Putting it in a safe deposit box would even be counterproductive since the list can only serve its purpose as a ready reminder if it's easily accessible to everyone. So when people fail to follow this tip, they may end of keeping it in a place where they have easy access to the tips so they may also fail to follow all the others.
Don't click links to websites The usual tip is "Don't click on suspicious website links" or "Don't click any links in suspicious emails". The comic's variation instead tells users not to click on any links to any websites, which essentially stops them from using the World Wide Web altogether. So this tip is not really helping, as the opposite of this would be to click on all links. This is an example website that showcases an extreme example of what could (probably wouldn't (this is not advice)) happen if you clicked on a suspicious link.
Use prime numbers in your password It is usually recommended that one uses numbers in one's password, to increase its entropy, making it harder to find with a brute force attack. In contrast the comic suggests using prime numbers in one's password. Large prime numbers are an essential part of modern cryptography and security systems, when used in algorithms that are computed by machines. They don't have any effect when used by humans in passwords, except for maybe making it harder to remember. In addition, if people were to regularly use prime numbers in their passwords, it would actually make passwords easier to guess, as it would substantially reduce the number of possible passwords people may choose from.
Change your password manager monthly It is often recommended to change passwords on a regular basis and to use a password manager. Password managers are programs which can help users create, store, and change their passwords easily and securely. Changing password managers monthly would involve copying all stored passwords from one manager to another, which would be quite impractical and has no security benefit.
Hold your breath while crossing the border At some border crossings, government agents may search computers, cell phones, and other electronic devices. The usual advice for such situations ranges from asserting your rights to resetting all devices and deleting all data prior to crossing a border. Holding one's breath can potentially prevent inhaling germs or poisons in some situations, though useless in the context of computer security. These two topics mixed in the same advice won't achieve anything, but if you hold your breath for too long you could pass out when crossing, or look stressed/suspicious and invite even more scrutiny. This could also be a reference to the superstition of holding one's breath when passing a graveyard, or similarly to the movie Spirited Away, where the main character is instructed to hold her breath while crossing the bridge that acts as the border between the human and spirit world. In any case, holding one's breath while browsing the Internet would have no useful effect, supernatural or otherwise.
Install a secure font A real tip might be "Install a secure browser" especially when many people used Internet Explorer 6. Secure fonts do exist and are designed to make checks difficult to alter, but using one on a computer would not help one's internet security. May also refer to Google Chrome "Install missing font" malware.
Use a 2-factor smoke detector Two factor authentication describes the practice of using two different identification factors (such as a password and a code from a secure token) to authenticate the user. A two factor smoke detector presumably uses two or more factors to identify smoke (such as ionization and photoelectric). Such devices actually exist, but, while improving the user's general safety, they do nothing to improve their internet security.

A month before this comic the newest xkcd Phone, 1809: xkcd Phone 5, was released with a 28-factor authentication.

Change your maiden name regularly A maiden name is the family name that a woman has at birth. (The gender-neutral term is "birth name" or "birth surname"; it is unclear whether this "advice" is meant to apply only to women.) Security experts frequently criticize the concept of security questions like "what is your mother's maiden name?", on the basis that they can often be deduced from publicly available information. In the sense that it refers to a historical fact, a maiden name cannot be changed retroactively, although in the sense that it refers to the last name on one's birth certificate, in some narrow cases this can be amended. For instance, when someone is adopted and takes their adoptive parent's last name, in many jurisdictions a legal fiction holds that they have had that last name since birth, and governments will issue new birth certificates to that effect. However, it is unlikely for anyone to be able to amend the surname on their birth certificate more than once, and impossible to do so "regularly".

A real tip for dealing with security questions is to enter false data.

Put strange USB drives in a bag of rice overnight The usual security tip is "Don't plug strange USB drives into your computer," because sometimes attackers leave USB devices with malicious programs lying around, hoping that people will plug them into target computers out of curiosity. This tip states that you should "put USB drives in a bag of rice overnight" which is a common technique for drying out water-damaged devices, due to rice's absorbent qualities. This would not clean the drive of viruses, and unless the drive was wet (perhaps because you found it outside due to it being called "strange") it would not do anything. In 1598: Salvage, another attempt is made to salvage something unconventional with rice, and here it is shown that Randall considers the rice drying of a wet mobile is a myth, so this is yet another jab at the idea.
Use special characters like & and % You can use special characters to increase the entropy/strength of your password, though as described in 936: Password Strength, that often leads to passwords that are hard to remember but not particularly strong. The password context is missing here, and in everyday situations the characters & and % are not special. These two characters are often disallowed in passwords because of their relevance to SQL (a common database query language). If these characters were used in a password, a badly written security system using SQL could have severe bugs (and security vulnerabilities) similar to the security flaw in 327: Exploits of a Mom.
Only read content published through Tor.com Tor is a software solution to provide anonymity on the web for its users. The website Tor.com is the website of fantasy and sci-fi book publisher Tor Books, which has no relation to the Tor-network.
Use a burner's phone A play on using a burner phone (a cheap/disposable cell phone like those purchased at 7-11, often used for drug deals or other activity one might not want traced), and using the cell phone of a burner, i.e. a person who habitually uses marijuana (or, less likely, a person who goes to the Burning Man festival).
Get an SSL certificate and store it in a safe place SSL/TLS is a protocol for securing connections on the internet. To check if someone is who they claim to be, you can check the individual's certificate. Such a certificate has to be public; storing it in a safe place makes the certificate useless. You have to store the private key that matches the certificate in a safe place, else someone could steal the identity.
If a border guard asks to examine your laptop, you have a legal right to challenge them to a chess game for your soul. This tip is a reference to the common trope Chess with Death, in which a mortal challenges a god to a game or challenge, often for their life. This version of the trope traces back to Ingmar Bergman's film The Seventh Seal, in which the protagonist challenges Death to a game of chess. But instead of avoiding death, this tip suggests you have the right to do the same to get out of handing your devices over to a border guard. (This trope is also featured in 393: Ultimate Game).

Under President Donald Trump (inaugurated two and a half months prior to this comic), border patrol and customs agents have become notorious for profiling non-Caucasian travelers and immigrants. Stories abound of agents coercing and threatening travelers to hand over their smartphones -- they do not have legal right to just take your devices under the Fourth Amendment, but have many not-entirely-idle threats they can level at you until you do as they wish.

This is the second tip referring to crossing a border. Randall has made several comics lately that could be seen as being related to issues concerning the election of Donald Trump as president - see more here.

Title Text: Never give your password or bank account number to anyone who doesn't have a blue check mark next to their name. The usual security tip here is "only trust Twitter accounts claiming to be legitimate if they have a blue check mark next to their name", which means that the account is verified as legitimate. This tip suggests only giving your password to verified accounts, although you shouldn't give your password to any account. Twitter Verification would be revisited in 1914: Twitter Verification.

It also refers to problems especially visible in the US banking system, where there is very little security for direct account drafts, and because of that it is advised there to keep the account number as secret as possible. In contrast, in Europe giving your account number to someone is one of the most common ways to get paid.

A related tip might be "Never give your password or bank details to a website that doesn't have a padlock icon next to the URL". In some browsers, if you access a secure website, there will be a padlock icon in the browser indicating you've connected to a secure website using the secure https protocol. It doesn't provide that it is not malicious site, and that is secure to enter. So this tip treats the verified account icon the same way you might treat a secure website icon.

Transcript

[Cueball is listening to Ponytail who holds her hands out in front of her.]
Ponytail: We've been trying for decades to give people good security advice.
Ponytail: But in retrospect, lots of the tips actually made things worse.
[Cueball takes his hand to his chin as Ponytail takes her arms down.]
Cueball: Maybe we should try to give bad advice?
Ponytail: I guess it's worth a shot.
[Below these two panel is one large and long panel with a long list with 13 tips. The underlined heading and the bracket below it are centered above the bullet list below.]
Security tips
(Print out this list and keep it in your bank safe deposit box.)
  • Don't click links to websites
  • Use prime numbers in your password
  • Change your password manager monthly
  • Hold your breath while crossing the border
  • Install a secure font
  • Use a 2-factor smoke detector
  • Change your maiden name regularly
  • Put strange USB drives in a bag of rice overnight
  • Use special characters like & and %
  • Only read content published through tor.com
  • Use a burner's phone
  • Get an SSL certificate and store it in a safe place
  • If a border guard asks to examine your laptop, you have a legal right to challenge them to a chess game for your soul.


comment.png add a comment! ⋅ comment.png add a topic (use sparingly)! ⋅ Icons-mini-action refresh blue.gif refresh comments!

Discussion

Secret questions are not 2-factor authentication (2FA). They are just a really shitty password, something that you know. --JakubNarebski (talk) 14:33, 5 April 2017 (UTC)

Secret questions are more like 0-factor authentication, since they typically ask for public data. Shirluban 141.101.88.106 14:39, 5 April 2017 (UTC)

Even when it isn't public it is often very unsecure - like: "your password has to have upper and lower case letters, numbers" and other requirements - if you forget it just enter the brand of your first car, there are about 20 likely answers (make it 40 if you need to additionally see wether or not it has been capitalized) 162.158.92.46 15:18, 5 April 2017 (UTC)


Use prime numbers in your password: this would only limit the number of possible passwords for a hacker to check.

Use special characters like & and % : this advice is thoroughly handled in https://xkcd.com/936/ Changing characters into a special one does adds just very little to the search space. However, a video from Computerphile suggests inserting a random character somewhere in the password which might actually be rather helpful

162.158.111.211 14:53, 5 April 2017 (UTC)

Note that if you replace any number n with the n-th prime number the security of your password would be really better. So would the length, of course. -- Hkmaly (talk) 23:44, 7 April 2017 (UTC)

Maybe you really should use a secure font Font related bug 162.158.79.161 15:13, 5 April 2017 (UTC)

Should the blue check mark tip be noted as only being useful on Twitter? Usually, the advice doesn't apply to emails, which are significantly more likely to ask for your less-secret account details, but also significantly less likely to have a blue check mark. 162.158.2.10 15:15, 5 April 2017 (UTC)

"If a border guard asks to examine your laptop, you have a legal right to challenge them to a chess game for your soul.", do any of you know exactly what is the original advice here? This is probably different in different countries, but if I recall correctly you can't prevent them from seizing your device, but you are not required to provide them your passwords (but they may give you a hard time or deny your entry if you are not a citizen). Anyone can confirm this? 108.162.216.22 15:16, 5 April 2017 (UTC)

In the UK, police can demand your password if they suspect a crime, and border staff can demand your password even without permission. People can be - and have been - imprisoned for not providing a password. Cosmogoblin (talk) 23:39, 15 August 2018 (UTC)


The rice trick doesn't even work for wet phones. http://www.gazelle.com/thehorn/wp-content/uploads/2014/05/Water-Damage-Prevention-and-Recovery.pdf 162.158.111.211 15:33, 5 April 2017 (UTC)

Yeah - beat me to it! The rice trick doesn't work...not for phones or anything else for that matter. So this is double bad advice. 162.158.69.39 16:06, 5 April 2017 (UTC)
As someone who has worked with electronics, educated in electronics design, I find the most effective solution is to remove all power as quickly as possible - unplug it and remove the battery - then let it dry out. Liquid damages by allowing electricity to take paths it shouldn't. No power, no problem. Which is why I don't and will never trust any device which doesn't allow you to quickly pop out the battery (iPads and many iPhones, for example). No battery pull means risk to me. - NiceGuy1 108.162.219.88 07:20, 7 April 2017 (UTC) I finally signed up! This comment is mine. NiceGuy1 (talk) 05:07, 13 June 2017 (UTC)

Border guard - I'd like to see a bit more explanation, please, on how Ingmar Berman's film shows a man playing chess with Death, and possibly the infamous subversion of this trope in Bill And Ted's Bogus Journey. As it is, the explanation is only the bare bones. --172.68.34.52 17:35, 5 April 2017 (UTC)

Checking the padlock icon in your browser is not enough to make sure you're really connected to the site you think. You have to check the domain too, to make sure you're not on a typosquatter domain (e.g. explianxkcd.com instead of explainxkcd.com). For really important thing like banking, you should check for an Extended Validation Certificate (Firefox shows the name of the organization running the website beside the padlock to indicate an EV-Certificate). This means, that the CA checked if the website operator really is who he pretends to be (and take a hefty sum of money for the process). Yeah, i know, security isn't easy. Using the brain still can't be replaced. --162.158.202.160 20:14, 5 April 2017 (UTC)

Extended Validation Certificate means that the CA SHOULD have checked ... Symantec for example didn't (and Google is punishing them for it). -- Hkmaly (talk) 23:44, 7 April 2017 (UTC)

These two characters are often disallowed in passwords because of their relevance to SQL (a common database query language). A badly written security system using SQL could have severe bugs (and vulnerabilities) if these characters were used in a password. So instead of fixing the bugs, users are kindly requested/forbidden to use & and % because that would break the system? Relying on empathy instead of fixing the problem, similar to "please don't break in, we're too poor to afford a decent lock". Sounds like Black Hat in a role as security advisor could come up with. 162.158.111.211 21:01, 5 April 2017 (UTC)

I once saw a funny notification at a login screen. It read: "Only log on if you are an authorized user". Hilarious... Elektrizikekswerk (talk) 13:03, 6 April 2017 (UTC)
In reverse, for work I'm supposed to come up with a 2-factor authorization method. A simple password is one factor. I thought the second factor was easy: you also need physical access to a computer in the network. Apparently that's not "technical" enough or something, external advisors tell us that the fact that a hacker needs to physically break in to hack the system doesn't count as a second factor. (if anyone can point to an authority saying that it does I'd be very happy!) 162.158.111.211 00:27, 7 April 2017 (UTC)

"Turing-complete kerning specification language in OpenType fonts" needs a citation. Is this just referring to the TeX language in general?

"the US banking system, where there is very little security for direct account drafts, and because of that it is advised there to keep the account number as secret as possible. In contrast, in Europe..." also needs citation. Why is giving out your bank account number more secure in Europe? I googled around a bit but couldn't find any verification of this (aside from discussions on chips vs. magnetic strips, which is a different issue). --Tractarian (talk) 17:29, 6 April 2017 (UTC)

From experience, here in the UK, if I wanted someone to transfer money to me online, I just give them my account number and routing (or "sort") code. People even publish this information on websites.

Specifically, a lot of the rules here place liability on the banks for fraudulent and unauthorised transactions as long as the consumer wasn't careless or breached the rules of their account.

See https://www.directdebit.co.uk/DirectDebitExplained/pages/directdebitguarantee.aspx https://www.chequeandcredit.co.uk/information-hub/faqs/cheque-fraud

But I can't imagine how anyone could initiate a transaction from my account without forging a document or hacking my online banking details (for electronic transfers).--162.158.111.37 19:33, 6 April 2017 (UTC)

Yeah from my, Dutch, view that part also seems strange. Like "I'm not telling you my e-mail address so you can't read my e-mail". Also, anyone you ever sent money to gets to know your account number don't they? After that, can they just walk into a bank saying "Hi I'm John, account number 12345, give me $5000 please"? I'd like a comic showing my accountnumber to test how I'd be hurt by telling the whole world :) It gets stranger, in order to get a refund to my credit card I not only had to give my credit card number but the expiry date as well. I always considered the expiry date as a very simple password to prove you have the card itself. This felt more like "You wouldn't want total strangers to put money on your account, would you?" (thinking about it, maybe it's used as a "checksum"). 162.158.111.211 22:35, 6 April 2017 (UTC)
As a North American, around here it seems like allowing someone to know your account number potentially gives a thief a target. If they manage to somehow hack their way into your bank, they now know a valid account number to aim for. Much less suspicious than trying their luck with picking one at random. Also, when we transfer money to each other, the account number doesn't enter into it. I go to my bank's website, start an e-Transfer, and tell it to send X dollars to this email account, and I add a security question - "What's my favourite online comic?" - and the answer - "xkcd". They get the email, select what bank they want to deposit the money to (and login to their bank's website), then give the arranged or known answer to my question. Our account numbers are only used / shared with our own respective banks. - NiceGuy1 108.162.219.88 07:20, 7 April 2017 (UTC) I finally signed up! This comment is mine. NiceGuy1 (talk) 05:07, 13 June 2017 (UTC)
There is nothing secure on credit card. Even the Card Security Code number is only protected by people not being allowed to store it in database. Yeah I'm sure thieves would comply with this rule. And that e-Transfer ... so, if someone intercepts that email and tells the bank it come to his email address, the bank would send the money to him? Doesn't seem safe either ; email is very insecure way to exchange data. -- Hkmaly (talk) 23:44, 7 April 2017 (UTC)
That's why these days even credit cards have PIN numbers. And actually, e-Transfers are one of the most secure things I take part in. On both sides of the transfer (i.e. both me and the person I'm paying) we each individually have to have a login setup with our banks, one which uses our bank card number and/or account number (hence part of the reason for a North American's aversion to letting anybody know what it is), and which includes a password like any other login. So, for a person to steal money from me by transfering it out of my account, they'd need my login name (if my bank uses one) or card number or account number - whatever the bank uses to figure out who you are online, plus having to know which one they need to know. The thief can't just set up a new login attached to my account, because I already have one, and banks don't allow a duplicate account. They would also need my password. And for a person to intercept my transfer, in addition to all that (for my recipient this time) they'd also have to intercept the email - which my recipient knows to expect, usually within minutes of when the email will arrive - but also they would need to know the answer to the question I set, which would usually be information you only share with the recipient. I'm reminded of Harry Potter And The Half-Blood Prince, where for security all good people came up with personal security questions to confirm each-others identities. In this case it can be as simple as "Where am I right now?", which you would have discussed when arranging payment, or "Where did we meet?" or "What teacher did we both have?", stuff like that. - NiceGuy1 162.158.126.76 05:53, 12 April 2017 (UTC) Mine too! NiceGuy1 (talk) 05:07, 13 June 2017 (UTC)
In the UK in 2008, the UK government lost 25 million sets of bank account details (on two unencrypted CDs sent through the post - this kind of data breach is a common pastime of UK government departments). Jeremy Clarkson claimed there was no security problem, and to prove it, he published his bank account and sort code. Within days somebody had donated £500 from his account to Diabetes UK. Cosmogoblin (talk) 16:07, 22 July 2018 (UTC)

"Don't click links to web sites"
Because it is trivial to have a link display "schmoo.com" but actually send you to "dastardlyevil.com" when clicked, this is actually usable advice. If the link displays an website address, one that is correct, highlight and copy the text and paste it directly into a browser's address bar. Barring that, right click on the link, copy the hidden link address, and paste that into the address bar. Of course then you should check carefully that the copied address isn't bougus. These Are Not The Comments You Are Looking For (talk) 00:49, 9 April 2017 (UTC)

Usually, any software I use will show the real address in the status bar when I hover the mouse over the link. I always check if these match, and if so, I know I can feel free to click (assuming said agreeing address is one I wish to visit, of course, LOL!) - NiceGuy1 162.158.126.76 05:53, 12 April 2017 (UTC) I finally signed up! This comment is mine. NiceGuy1 (talk) 05:07, 13 June 2017 (UTC)
I go further - if I'm at all suspicious of a link I'll type it directly. Copy-paste will retain homoglyphs, characters which look similar but aren't; for example explainxkcd.com is correct, but eхplainхkcd.com is not (using the Cyrillic HA in place of the Latin x), and could be registered as an entirely different website. Cosmogoblin (talk) 16:16, 22 July 2018 (UTC)

"If the smoke detector worked according to the authentication logic it will be less likely to detect smoke, effectively lessening fire safety as compared to a single sensor one"

It'll be less likely to detect fire, but that does not necessarily mean lesser safety. There is a possibility of a "fire alarm that cried wolf" syndrome. If there is ever a real emergency, you really don't want people think "it's probably just another smoking toaster, I have time to take a quick shower and brush my teeth before I leave". --172.68.54.52 08:04, 9 April 2017 (UTC)

The point here is not more safety but fewer false alarms. Similarly in rooms were you have "smoke" regularly you might either install a detector that doesn't scan for smoke but instead for heat or infrared light or you might install two smoke detectors in the far corners of a larger room, that only give an alarm if they both detect smoke. --162.158.90.126 13:28, 9 April 2017 (UTC)
In a two-alarm system like that, you could have a small fire break out close to one detector that, by the time it has created enough smoke to trigger the far detector and start the alarm, has grown to the point that it has now become difficult to fight, and at the very least has caused considerable damage which could have been prevented if only the first detector had "spoken up" immediately. A system that second-guesses itself is NOT good. - NiceGuy1 162.158.126.76 05:53, 12 April 2017 (UTC) I finally signed up! This comment is mine. NiceGuy1 (talk) 05:07, 13 June 2017 (UTC)

Fourth amendment does not apply to border or customs searches

See border search exception: https://en.m.wikipedia.org/wiki/Border_search_exception

In fact we don't need the entire paragraph about the fourth amendment.

  • Use a burner's phone

While it's possible that "burner" could refer to someone who attends the Burning Man festival, I believe it's more likely this is referring to someone who smokes marijuana, which is a common term in popular informal English. This also makes a nice connection with the part about typical usage of burner phones by drug dealers. --Ianrbibtitlht (talk) 14:11, 8 June 2017 (UTC)

Agreed. I feel like there's no question, Randall is referring to a pot smoker, i doubt there was ever any intent by him to reference Burning Man here. NiceGuy1 (talk) 05:24, 13 June 2017 (UTC)


The tip in the title text isn’t technically wrong, just misleading, as you shouldn’t give you passwords or bank info to people without blue checkmarks. You also shouldn’t give them to people with blue checkmarks either, of course, but that doesn’t make the tip wrong. PotatoGod (talk) 15:44, 10 August 2018 (UTC)

did something happen to this page? i can't remove them either. JLZ0kTC5 (talk) 01:49, 24 July 2023 (UTC)