Editing 2522: Two-Factor Security Key

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 46: Line 46:
 
** Prior to ubiquitous use of the internet (or other dial-in networks), software companies might protect their products with a {{w|software protection dongle}} to replace or augment the more easily-sharable licence keys(/passwords) and enforce the use of no more copies than had been paid for. - With the advent of the connectivity needed, a "phone home" technique has largely replaced the necessity of this, a central server vetting the use (and/or transfer) of sofware between machines. But {{w|Universal 2nd Factor|related technology}} is a modern implementation that is ''probably'' what Cueball's keyringing efforts involve.
 
** Prior to ubiquitous use of the internet (or other dial-in networks), software companies might protect their products with a {{w|software protection dongle}} to replace or augment the more easily-sharable licence keys(/passwords) and enforce the use of no more copies than had been paid for. - With the advent of the connectivity needed, a "phone home" technique has largely replaced the necessity of this, a central server vetting the use (and/or transfer) of sofware between machines. But {{w|Universal 2nd Factor|related technology}} is a modern implementation that is ''probably'' what Cueball's keyringing efforts involve.
 
** A device similar to the fob/dongle could also use short-range wireless communications (Bluetooth, RFID, Near-Field Communication or some proprietry method) to indicate the proximity (and identity) of the token to a receptive system. Some high-end car models offer such a system in place of an ignition key for... some absolutely valid reason.{{citation needed}}
 
** A device similar to the fob/dongle could also use short-range wireless communications (Bluetooth, RFID, Near-Field Communication or some proprietry method) to indicate the proximity (and identity) of the token to a receptive system. Some high-end car models offer such a system in place of an ignition key for... some absolutely valid reason.{{citation needed}}
βˆ’
** With "Remember my password" options in browsers and {{w|password manager}}s, ostensibly to prevent over-the-shoulder attacks and/or the prevalence of weak passwords, increasingly the 'known' password has become more of a possession tied to a particular device (and any other device that has been linked by the synchronisation of such internal information).
+
** With "Remember my password" options in browsers and {{w|password managers}}, ostensibly to prevent over-the-shoulder attacks and/or the prevalence of weak passwords, increasingly the 'known' password has become more of a possession tied to a particular device (and any other device that has been linked by the synchronisation of such internal information).
 
** A code sent to a further service, such as emails to a (different) email account, or SMS message to a phone, or push notification sent to a smartphone. Retaining the possession of (and access to) these systems is often left more up to the end-user than with vendor-controlled systems, which can be an issue when used as a fall-back reauthentication method (see below).
 
** A code sent to a further service, such as emails to a (different) email account, or SMS message to a phone, or push notification sent to a smartphone. Retaining the possession of (and access to) these systems is often left more up to the end-user than with vendor-controlled systems, which can be an issue when used as a fall-back reauthentication method (see below).
 
** A non-computing example is the {{w|Token (railway signalling)|Railway Token}}, sometimes combined with quite ingenius {{w|Annett's key|key-and-lock}} systems, to enforce safe line-use.
 
** A non-computing example is the {{w|Token (railway signalling)|Railway Token}}, sometimes combined with quite ingenius {{w|Annett's key|key-and-lock}} systems, to enforce safe line-use.
βˆ’
* '''What you are''' - Some quality that relates to your {{w|biometrics|physical person}}. It may very hard (but not {{w|amputation|impossible}}) to lose this, or to have someone else use it. Physical coercion may be the greatest threat to this attempt to maintain security, much as it could be used for the others as well. Until recently, the hardware needed made this more of a cinematic 'solution' (to be foiled by resourceful antagonists/progatonists) or in a limited number of high-security situations, but it has also started to make inroads into consumer use. They are rarely used directly for online verification (though they can be), but more often are used to authorise the device to communicate it's intrinsically possessed verification key (or just to generally use that device).
+
* '''What you are''' - Some quality that relates to your {{biometrics|physical person}}. It may very hard (but not {{w|amputation|impossible}}) to lose this, or to have someone else use it. Physical coercion may be the greatest threat to this attempt to maintain security, much as it could be used for the others as well. Until recently, the hardware needed made this more of a cinematic 'solution' (to be foiled by resourceful antagonists/progatonists) or in a limited number of high-security situations, but it has also started to make inroads into consumer use. They are rarely used directly for online verification (though they can be), but more often are used to authorise the device to communicate it's intrinsically possessed verification key (or just to generally use that device).
 
** Fingerprint scanners are an old standard, and may even now be able to protect against the [https://whatis.techtarget.com/definition/gummy-bear-hack Gummy Bear trick].
 
** Fingerprint scanners are an old standard, and may even now be able to protect against the [https://whatis.techtarget.com/definition/gummy-bear-hack Gummy Bear trick].
 
** Eye-scanning (using iris, retina or scleral vein patterns) is a favourite movie version, and perhaps possible with sufficiently high-resolution macro-lensed cameras.
 
** Eye-scanning (using iris, retina or scleral vein patterns) is a favourite movie version, and perhaps possible with sufficiently high-resolution macro-lensed cameras.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)