Weekly Update 446

Weekly Update 446

Released Saturday, 5th April 2025
Good episode? Give it some love!
Weekly Update 446

Weekly Update 446

Weekly Update 446

Weekly Update 446

Saturday, 5th April 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

What other beer was I going

0:03

to drink, honestly, when I came

0:05

to Ireland? It was about the

0:07

only option. If you're listening to

0:09

this later on, I have a

0:11

tall, frosty, cold Guinness, which is

0:13

about exactly what you'd

0:15

expect from Ireland, isn't it?

0:17

That was lovely. It tastes different

0:20

here as well. We got to

0:22

Ireland yesterday. So a very long

0:24

trip for such a short distance.

0:26

There's definitely here. Yeah, Stefan's happy

0:29

because I'm doing this at a

0:31

normal time of day. But yeah,

0:33

so I didn't tell you this,

0:35

Stefan, but we, um, winner, I did

0:38

the thing in Iceland the other day,

0:40

we were meant to get up and

0:42

get a, what was it, a 730

0:44

a.m. flight from Iceland, actually, before

0:46

that, we're meant to go to

0:49

the blue lagoon in Iceland, but

0:51

then Stefan had a, um, a

0:53

volcano, and that didn't work. Why

0:55

can I say, oh there's my

0:58

live chat there. Yeah, so Stefan,

1:00

we'll blame Stefan, Stefan, had a

1:02

volcano, so we couldn't go to

1:05

the blue lagoon because there was

1:07

lava. Apparently that's bad for going

1:09

to the blue lagoon. So I

1:11

had to have an extra night

1:13

in Reykjavik, had one of the

1:16

best meals we had in a

1:18

long time. I didn't tell you about

1:20

this too, either, Stefan. I know you

1:22

saw it on my Facebook. And I

1:24

just put it on, I don't think

1:26

I post anything to Facebook that isn't

1:29

public, because you got to work on

1:31

the assumption that one day it will

1:33

be anyway. So anyway, some pictures like

1:35

that. So I went out, had a

1:37

really good night, found a really cool

1:39

bar with really cool live music, that's

1:41

on Facebook. And yeah, had to go

1:43

home to get up at 4am, to get

1:46

a 730am flight, to leave Reykjavik

1:48

and come to Dublin. And after the really

1:50

nice night we'd had... It was not fun

1:52

getting up at 4am, but we did it.

1:54

And then as we were in the car on the way

1:56

to the airport, Iceland Air decided to tell

1:59

us that the flight... was two and a

2:01

half hours late which they knew before we

2:03

left the hotel because it was coming from

2:05

Chicago so that was a bit sucky so

2:07

we sat around in the airport for a

2:09

very long time and then we got to

2:12

Ireland and then we drove nearly three hours

2:14

as well to get to where were we

2:16

I don't know I just sort of literally

2:18

follow ways from place to place first trip

2:20

to island stayed at a pretty cool

2:22

place last night had some Guinness because of

2:25

course it's the first thing I'm going to

2:27

do an island having a Guinness And

2:29

then today we drove three and

2:31

a half hours. Now, honestly, I

2:34

don't know where I am. If I go, where's

2:36

my location here on the map?

2:38

We drove to Kerry. We need

2:41

Limerick, actually. There you go. Near

2:43

Limerick. So, if you're like me

2:45

and you have no idea where

2:48

anything is in Iceland, island, not

2:50

Iceland. And you need a map.

2:52

It's towards the bottom left. According

2:54

to Google Maps at the moment.

2:57

So it has been a little

2:59

bit of sight seeing today. It's

3:01

like cool today, like a half

3:04

work date. So we are, where are we now?

3:06

Just after 4 p.m. Which again, it's

3:08

kind of weird because it is at

3:10

a time, but never normally do it

3:12

from home. Services love getting these

3:15

notifications late. Yeah, you know,

3:17

the flight thing. Like getting a

3:19

notification that your flight is canceled

3:21

when you're actually in the, actually

3:23

at the airport. You know, the saving grace

3:25

was, it was a direct flight. And there

3:28

is nothing worse than when you're on a

3:30

flight and you realize your connecting flight is

3:32

going to be canceled or you're going to

3:34

be late or something like that. And then

3:37

you're trying to figure out how do I

3:39

join all the dots with, which is basically

3:41

what happened to us with Brisbane when we

3:43

came over to London Heathrow and Heathrow shot

3:46

the other day. You get to the airport

3:48

and then you're like, if I can't get

3:50

to my meetings on Monday and... Anyway, it

3:52

is an absolute pain in the ass. So,

3:55

yeah, fortunately, fortunately, it

3:57

wasn't too bad. Two and a half

3:59

hours. Anyway, Ireland, it's

4:01

nice here. If I'm honest, it feels a

4:03

lot like the UK. Probably for obvious

4:06

reasons. It's very close. We drive on

4:08

the same side of the road, which

4:10

is a lot like home, which is

4:12

kind of handy. I'll be in Dublin

4:14

on Tuesday, Wednesday, Thursday, next week doing

4:17

some work things as we don't have

4:19

a public event at the moment. I

4:21

do have some stickers left. If anyone

4:23

at the very last minute

4:26

can make a public event

4:28

happen in Dublin, that's fantastic.

4:30

Since I did this video last, we

4:32

did have a great public event in

4:34

Reykjavik. So Monday morning we did an

4:36

event at Make There. It was awesome. We

4:38

had a whole stadium full of people.

4:40

We gave out loads and loads of

4:43

stickers and 3D printed logos. Loads of

4:45

good logos. Loads of good Q&A. It

4:47

was just fun. I think you'd agree, man.

4:49

It was fun. Seven says I assume the

4:51

legend is true. And the Guinness and

4:53

Ireland is actually even better than elsewhere.

4:55

Yeah, and I was just before you

4:58

came on. It looks darker, the

5:00

same colour as this black wooden thing

5:02

behind me. I was actually thinking

5:04

last night when I had one, I

5:06

wonder if the alcohol percentage is the

5:09

same or a little bit more, I

5:11

know that's one of the things that

5:13

gets tweaked around the world because then

5:15

they've got different liquor licensing laws and

5:18

rates and things in different places. But

5:20

no, this is lovely, I'm very happy with

5:22

this. Hmm. Soft or tea who's happy

5:24

to be here. I don't need to

5:27

self-ingrationingly. You have that much guiness. Self-inggressiating,

5:30

read all that out. Anyway, so, back

5:32

to business. As you may remember from

5:35

last week, I had an unfortunate

5:37

fishing-related incident,

5:39

and I'm going to talk about

5:41

the fishing-related stuff more in a

5:43

moment, because a few other things

5:45

have come out since then. But

5:47

one of the things that came

5:49

out as a result of the

5:51

fishing-related incident was to have a

5:54

new sponsor on board, which is

5:56

malware bites. male butts browse a

5:58

god in particular because It

6:00

helps not end up like I

6:02

ended up the other day. One

6:04

of the great strengths of browser

6:06

guard is blocking fishing attacks. Blocking

6:08

fishing, blocking ad scams and trackers and

6:11

safer browsing for all. Now, one of

6:13

the, I guess, the joys of blocking

6:15

a lot of the sort of stuff

6:17

that browser guard blocks. I was just

6:20

reading through their website before I

6:22

started this. I was waiting for

6:24

my goodness. And it's all the

6:26

sorts of stuff that any of

6:28

you have been running ad blockers

6:30

or pie holes or things of

6:32

that for a while. The amount

6:35

of rubbish that gets added into

6:37

your browser session, that's not just

6:39

tracking, potentially fishing, but even speed.

6:41

And it's really wild if you go

6:43

somewhere and don't run your ad blocker.

6:45

And you see how different it looks.

6:47

I know when we left Australia the

6:49

other day, Shah, I was like, you

6:52

see how many ads we get when

6:54

we're over here? everything gets blocked. So

6:56

go and check out malware bites

6:58

and browser guard that their timing

7:00

is impeccable with this fishing-related incident

7:02

the other day. So big thanks

7:05

to them and doing it you

7:07

know that it can just be

7:09

the smallest little thing that you

7:11

fall for that results in a

7:13

fish that can have the biggest

7:15

impact. That's probably a nice segue

7:17

into this topic. I love it

7:20

when a sponsor lines up really

7:22

well with content. Let's talk a

7:24

little bit more about my Mailchimp

7:26

incident. Scott's there, hey Scott.

7:28

Those of you who may recall, Scott was

7:30

there, just after it happened, he

7:32

saw the look on my face.

7:34

I fell from Mailchimp Fish. I

7:37

had not only my credentials fished

7:39

because I copied and pasted them

7:41

into a browser window because I

7:43

thought it was just a different

7:45

URL to authenticate to the legitimate

7:47

Mailchimp service, but I had my...

7:49

One-time password also fished because

7:52

I copied and pasted that

7:54

Now I talked about that at length

7:56

last week if it's all news

7:58

Go and watch it We're now, when

8:00

was it Scott, it's Tuesday morning,

8:03

wasn't it? So we're now like

8:05

10 days since I got fished.

8:07

And I've learned a few different

8:09

things. So one is that that

8:11

male fishing campaign went too

8:13

many different parties. Which is

8:15

one of the interesting things.

8:18

I have had direct conversation

8:20

with a couple of those parties.

8:22

One of those parties. who I won't

8:24

know, won't name, but they have

8:26

sent disclosure notices, but if someone

8:28

disclosed the nature of the discussion

8:31

I had with them, did get

8:33

fished for a substantially larger number

8:35

of unique email addresses than mine,

8:37

which is not surprising because mine

8:39

is just a little personal blog

8:41

and there are genuine businesses out

8:43

there building products. Now what

8:45

was interesting with that fish, and I'm

8:48

yet to reply to Mailchimp, but if

8:50

you're listening to this, the email was

8:52

coming. In that incident,

8:54

and also in the other incident

8:56

where someone received the fish but

8:59

didn't fall for it, so the three

9:01

different cases I know of,

9:03

successful one of my own successful

9:05

case, every one of those, there's

9:07

an email address that the Fisher

9:09

person probably shouldn't have had. And

9:12

what I mean by that is

9:14

it wasn't an obvious one, it

9:16

wasn't something where they... had a

9:18

high likelihood of knowing it to

9:20

begin with, number one. Number two,

9:23

it was also effectively just the

9:25

one email that went bam, straight

9:27

to that person. And number three,

9:30

it wasn't someone else at the

9:32

organization that received the same fishing

9:34

emails. And I have a

9:36

mounting probability, or I think there's

9:38

a mounting probability, that

9:40

marching themselves got their

9:42

list taken from somewhere.

9:44

I have asked that question directly before I had

9:47

this additional information and they seem to think

9:49

that was not the case outside of the

9:51

known incident from a few years ago. If

9:53

you're listening to this and you have received

9:55

a mail chimp fish, whether you fell for

9:57

it or not, I would really really like

9:59

to know. Now further

10:01

to that and I haven't shared

10:03

this yet, but there's been

10:06

some interesting research here

10:08

I want to Touch on

10:10

because this This does relate

10:12

to what we're talking about

10:14

Where are we here? I

10:16

saw on the news There's

10:18

an alleged database of send

10:20

grid available 850,000 customers, which

10:22

would also be me wouldn't

10:24

that be freaking ironic? I

10:26

get fished My data gets leaks

10:29

I got fit Let's say

10:31

allegedly got fished, definitely

10:33

got fished allegedly because I

10:35

think that email address of the

10:37

time somewhere on the Malchum side

10:40

of things successfully got fished, my

10:42

data got leaked. I of course

10:44

I know exactly what data was

10:46

got leaked so I what was

10:48

got leaked with that much Guinness

10:50

in. I know exactly what data

10:52

was like so I put it in have

10:54

a pen. And then to make it

10:57

perhaps even more ironic. Now

10:59

we've got Singrid allegedly breached

11:01

and allegedly for sale, whether

11:04

or not they breached or not, we

11:06

had to see. And holy crap,

11:08

I've just actually clicked on

11:10

that tweet. The number of

11:12

fields that are in here,

11:14

allegedly. Route domain, location on

11:16

site, technology spend, sales revenue,

11:18

social, SCU, company, vertical. I

11:20

am two lines out of,

11:23

I reckon about 40 lines,

11:25

into reading the fields, and

11:27

they just go on. It's

11:29

a field called HCPS. It's

11:31

a field called third-party facades.

11:33

A field called HMLL Lang

11:35

Valour, it just goes on

11:37

and on and on and on. This

11:40

is from Dark Web Informer

11:42

on X. This data is for sale.

11:45

Apparently, 850,000 customers. for $2,000

11:47

which sounds cheap with this

11:49

amount of data. Now the

11:51

irony bit of it is

11:53

if this is legitimate then I'm

11:55

in there because we use Sengred

11:57

for have I been told. So

12:00

that would suck if I'm in there again.

12:02

Do they say passwords are in

12:04

there because that's always a bit

12:06

of a bit of a giveaway.

12:09

Has this been like scraped or

12:11

exported? I doubt scraped or I

12:13

think anywhere would expose that, but

12:15

has it been exported from a

12:17

web admin which would not typically

12:20

export passwords? Is that possible?

12:22

I don't know. Anyway, so back on

12:24

topic. This was written up. I'm

12:26

going to get my names right here.

12:28

Where is the story here? Here

12:31

we go from Silent Push.

12:33

So I have had a bit

12:35

of a chat with Silent

12:37

Push offline. They wrote a

12:39

write-up attributing the

12:41

fishing campaign to Scattered

12:44

Spider, which is a,

12:46

I guess, a well-organized group

12:48

with some runs on the

12:50

board, including me. I saw that write

12:53

up last week. I've put that

12:55

in one of the updates. on

12:57

the blog post, this update has

12:59

come through literally just overnight, our

13:02

time, and this also links in

13:04

the mail chimp, sorry, the send

13:06

grid situation as well. And effectively,

13:09

what's the, we need a little T or

13:11

D, the top guys, key findings. So

13:13

I push threat analysts are sharing

13:15

our discoveries related to a

13:17

cryptocurrency in bulk email, provide

13:20

a fishing campaign, targeting enterprise

13:22

organizations and VIP individuals. I

13:24

guess, outside the cryptocurrency industry.

13:26

Along with the supply chain,

13:28

it's not really the thing

13:30

you wanted to be associated

13:32

with. I was important enough

13:34

to get fished. I still

13:36

don't think it was, anyway,

13:38

the only thing was targeted.

13:41

It goes on, targeted crypto

13:43

companies include coinbase and ledger, and

13:45

targeted CRM and bulk email providers

13:47

include mail chimp, Sengrid, Hub Spot

13:49

Mail Gun, and Zoho. I've got

13:51

a mail gun account somewhere too.

13:54

I probably shouldn't say that

13:56

I need fished again. So

13:58

they are referring to this. is this

14:00

initiative, yes, initiative campaign

14:02

as poison seed. We're

14:05

classifying poison seed distinctly

14:07

from two loosely aligned

14:09

threat actors scatter spider

14:11

and krypticamillion. This feels like it

14:13

should be the total of a

14:16

song, krypticamillion. Both of which

14:18

are associated with the Com, which

14:20

is a particularly... unpleasant collective of

14:22

folks who've done some really really

14:25

kind of nasty stuff if

14:27

you read up about it. I

14:29

haven't read this story yet because

14:31

I got it just as we were

14:33

driving today. What is actually in

14:36

here? It's a detailed write-up. The

14:38

first one is a very detailed

14:40

write-up too. A little bit of

14:42

stuff in here about me and Mailchimp

14:44

which is fine. We're all here to

14:47

learn from my misfortune. Have

14:49

a read of this. I'm going to...

14:51

Absorb this in-depth over

14:53

Guinness later. Well, there's

14:55

a lot of detail here. I guess

14:57

my feeling is that most of

14:59

this seems to ultimately

15:02

lead to crypto-related spam. And

15:04

most of it is

15:06

not particularly sophisticated

15:09

or be it well executed.

15:11

When I think about the

15:13

incident against me, I feel

15:15

like that's a fair summary.

15:17

It's a fishing page. It's

15:20

not particularly complex to make

15:22

a fishing page. It wasn't

15:24

exactly sophisticated. It was, as

15:26

I've said before, just the

15:28

right level of urgency without

15:30

alarmism, which would have set off

15:33

my alarms, thinking that this was a

15:35

weird one. So I feel like they

15:37

just, they just handed to them. They

15:39

just did a really, really good job

15:42

of this fishing campaign. So since then,

15:44

I've had many discussions with organizations in

15:46

very positive ways. including ironically the NCSC

15:49

who I was meeting the day before

15:51

where we were talking about past keys

15:53

and then I got fish for the

15:56

past keys and we continued that chat

15:58

a little bit later. I think earlier

16:00

this week, and I was like, hey, you

16:03

know how we're looking for a good example

16:05

of demonstrating the value of pass keys? Well,

16:07

I just wanted to help, it wasn't

16:09

deliberate, but we now have really

16:11

good material. So one of the

16:13

things I am on a little

16:16

bit of a rampage with now

16:18

is having non-fishable second-factor authentication. And

16:20

I've always known this was valuable.

16:22

It's obviously much more personal now.

16:25

And really we're talking about either

16:27

past keys or physical U2F keys.

16:29

Having OCTs generated by an authentic

16:31

caterap or an SMS are very

16:34

fishable and very very trivially circumvented

16:36

as a security control. I

16:38

have been writing this blog post which

16:40

I had thought I might have done

16:42

before today, which is past keys for

16:44

normal people. It is taking longer

16:47

than expected, partly because of travel,

16:49

but partly because... It is very

16:51

hard to write something for normal

16:53

people without it seeming like a

16:56

complete clutch. And I'll give you

16:58

a good example. So I start out

17:00

by saying, ironically, literally minutes

17:03

before I got fished, I was looking

17:05

at a WhatsApp message from WhatsApp themselves,

17:07

encouraging me to turn on pass keys.

17:09

And I'd already planned to write this

17:12

blog post. I was talking about it

17:14

literally the day before at the NCS.

17:16

I'll park this. I'll write it when

17:19

I have time. So when I

17:21

started writing, I said, okay, let's

17:23

do the WhatsApp thing. Pretty trivial.

17:25

Not entirely clear to me where

17:28

I'll actually use it for

17:30

authentication because WhatsApp normally sends

17:32

you an SMS or you

17:34

pair another existing authenticated device.

17:36

And I thought, well, let's

17:38

do something that most people

17:40

understand. And I was looking at pastkeys.

17:42

Directory. Is provided by one

17:44

password. Obviously, we've got a

17:46

long-standing relationship with them. We are also

17:49

discussing about how we can do more

17:51

stuff with pass keys as well, and

17:53

particularly push their usefulness. And I'm looking

17:55

at pass keys dot directory, and I'll fire it

17:57

up on the iPad just so we can talk.

18:00

through this together. It's a very

18:02

very nicely built little website, shows

18:04

all these websites that support pass

18:06

keys, as well as another tab

18:08

which says vote for pass key

18:10

support. So it's all these websites

18:12

that don't support pass keys but

18:14

people would like to have them.

18:17

This is going to be a really

18:19

good source of data for me to

18:21

do why no pass keys.com. Because I

18:23

want to take that list of sites

18:25

that don't have it, split them by

18:28

country, rank them. And then we'll put

18:30

a little bit of heat on

18:32

these organizations on a per country

18:34

basis to say, why don't you

18:36

have pass keys yet? Anywho. So

18:38

I'm looking through the list of who

18:40

has pass keys. And the obvious big

18:43

one out there that most people will

18:45

recognize and understand that isn't

18:48

either a smaller entity or

18:50

something that's very sort

18:52

of tech-centric is linked in.

18:54

So I will add to my blog

18:56

post, the next bit here will be

18:58

linked in. So let's talk about how

19:00

to turn on past keys in LinkedIn.

19:03

And I go through and I'm

19:05

screen capping it all and I've

19:07

turned on the past key. I

19:09

said, all right, this is good,

19:12

this looks really good. Now

19:14

how do I replace the

19:16

soft authenticator OTPs with the

19:19

past keys as a second

19:21

factor? Now here's the answer.

19:23

You can use a past key

19:25

to sign in and solely a

19:27

past key. Or you can use a

19:29

password to sign in. And if you use

19:31

a password, of course you need a

19:33

second factor because, well we know why,

19:36

if you choose a second factor

19:38

you can choose from either

19:40

soft authenticator or SMS. So

19:42

it just blows my mind because

19:44

I've done all the plumbing and all

19:47

the mechanics to implement pass keys,

19:49

but purely as a usability feature

19:51

to sign in and not as

19:54

a security feature, which means. You

19:56

still have to have a password. You

19:58

still have to have... a soft authenticator

20:01

or an SMS OTP, so

20:03

you can have a downgrade attack. If

20:05

someone can convince you to enter

20:07

those weak credentials, credentials being the

20:10

email address, the password and the

20:12

OTP, if someone can convince you

20:14

to enter them into a fishing

20:16

page, then enter your LinkedIn.

20:18

That would have been frankly so much

20:20

worse for me if someone was

20:23

into my LinkedIn because I've got

20:25

so many messages with people. There

20:27

are messages in there about... Business deals

20:29

we've done, or data breaches that have

20:32

been disclosed, or meetings that I've had

20:34

with people in person, it would be

20:36

a nightmare. So I'm having to write

20:39

this up and go, you know, here's

20:41

how to turn it on. By the

20:43

way, it actually won't do anything for

20:46

you, and linked in, other than

20:48

make your life easier to authenticate.

20:50

And one of the things that

20:52

one password does with pastkeys. Directory,

20:54

is if you have a look,

20:56

they've got three columns there, name,

20:58

name, name, and then supported and

21:00

then category. So for example

21:03

under Adobe what's supported

21:05

sign-in and as you keep flicking

21:07

down it's like sign-in, sign-in, sign-in,

21:09

sign-in and sign-in and one

21:11

in about probably 20 different sites

21:14

that implement pass keys supports

21:16

it for MFA. Now it's not

21:18

immediately clear to me if all

21:20

of these ones where it's supported

21:22

for sign-in you can actually get rid

21:25

of the password altogether altogether.

21:27

Which would be fine? There's a

21:29

problem. We'll come back to it. But

21:31

it would be fine. It would be much

21:34

better, in my view, than having a

21:36

username and a password and an

21:38

OTP as a second factor. So

21:40

it's fascinating, as you try and explain

21:43

past keys to normal people, how

21:45

we not only have to explain

21:47

the mechanics of what it is,

21:49

and I think I've effectively referred to

21:51

it as a digital file which is

21:54

stored and synced and synced. You know,

21:56

like all the cryptography stuff in the

21:58

Fido bits and everything is... is

22:00

not what normal people, normal

22:02

people, normal people, would

22:05

actually use, or what normal

22:07

people need to understand. So

22:09

that's part of the problem. Then

22:12

of course part of the problem

22:14

is a little bit like passwords,

22:16

in fact I've explained it like

22:18

passwords, so do you know how

22:20

when you go to a website?

22:23

Different websites have different password complexity

22:25

criteria, where sometimes it needs to

22:27

be six characters, sometimes it's got

22:29

to be eight, sometimes it's got to

22:31

be an upper case. Well, the way that

22:33

you implement a passkey is very similar, because

22:36

sometimes it's in the security settings, sometimes in

22:38

the profile settings. Sometimes you have to prove

22:40

control of your email address first. Sometimes you

22:42

have to enter your password first. The

22:45

experience is always different. And it

22:47

is extraordinarily hard to create a

22:49

compelling... story for normal people that

22:52

they can absorb an action Which

22:54

is kind of wild. Geez just

22:56

looking through this list the

22:58

number of... What's really? Especially

23:00

interesting is to look at

23:02

the tab About the sites that

23:04

don't support it. Now what I

23:07

like about the way one password's

23:09

done this is you can vote.

23:11

Now you don't have to authenticate

23:13

or anything either Which does make

23:15

me wonder if anyone's been

23:18

gaming? That number one service,

23:20

which doesn't support pass keys,

23:22

and is the highest voted one,

23:24

is steam. But Netflix is

23:27

after that. So here's the...

23:29

Actually, it's quite funny. Number

23:32

one, remember, this is the one

23:34

password list of services that

23:36

do not support pass keys.

23:39

Number one is steam. Number

23:41

two is Netflix. Number two

23:43

is Disney. It's

23:46

more of an optics

23:48

thing, you know. There

23:50

are many other mitigating

23:53

security controls

23:56

around one

23:58

password. Yeah, for example,

24:00

you need to have the secret key.

24:02

The secret key goes beyond just the

24:05

email address and the password and the

24:07

second factor. But yeah, maybe the optics

24:09

guys, like maybe adding, because you can

24:11

do two-f-a with your one-passward account, you

24:13

can do two-f-f-a with an OTP, we

24:15

know the problem with that, so maybe

24:17

adding past-key support would be good. Interestingly,

24:19

after that, signal, Instagram, Redit, chat, chat, GPT,

24:21

Proton Mail, Proton Mail, sounds

24:23

like an obvious one, because

24:25

they're so privacy-centric, because they're

24:27

so privacy-centric. So, there's loads

24:30

and loads and loads of things in

24:32

here that we'd like to see better

24:34

support for pass keys. And I think

24:36

the way we've got to look at

24:38

this is this is a very early

24:40

time using what, by all accounts,

24:42

is the success or to the

24:45

password. And I have no problem

24:47

with using your pass key for

24:49

authentication. But because of such an early

24:52

time, we're missing continuity,

24:54

we're missing consistency, and

24:56

we're missing... that I guess

24:58

that the heart of

25:00

what makes it so

25:03

important being a non-fishable

25:05

second factor which is

25:07

not having the fishing

25:09

fishable second factor

25:11

still there so I don't know

25:14

what do you keep doing so

25:16

if we go it's a good

25:18

time to be in the

25:20

industry let's look at the

25:23

comments um Richard's here there Richard

25:25

Yeah you didn't see Richard at

25:27

Summit. You must do that. You

25:30

know Soft Tortilla says I love

25:32

using Google's advanced protection to protect

25:34

all my devices with pass keys.

25:36

I wrote a blog post several

25:39

years ago about tooth factor and

25:41

also just I mentioned something

25:43

before I want to come back to. When

25:46

I was tweeting some of

25:48

this stuff or talking about, or whatever we

25:50

call the different social things now. At one

25:52

point in time, I was talking about past

25:54

keys and one password and someone sort of

25:56

said, well if you save your past key

25:58

in one password, it's no longer 2FA. because

26:00

everything is on the one device. And

26:02

if you know how to unlock the

26:04

device, well then that's just something you

26:07

know. Or if you know the credentials

26:09

to restore it from one password's

26:11

cloud. And I think there is

26:13

noise that we get lost

26:15

in, which is the semantic

26:17

definition of the technology. We

26:19

keep saying two-FA, MFA, two-step,

26:21

two-step, multi-step. Let's stop

26:24

worrying about these things. A lot of

26:26

people have argued for a long time,

26:28

well, if your Authenticator app is on

26:30

your mobile device, then it's not 2FA.

26:33

It really needs to be a separate

26:35

thing because if you can restore it

26:37

from somewhere else, then you don't necessarily

26:39

have to have the device. Therefore, it's

26:41

not proper 2FA. So, okay, I understand

26:44

what you mean, but... It sounds like a

26:46

very academic argument. Let's talk about what

26:48

that means in practice. It means that

26:51

if someone can, for example, restore from

26:53

your I-Cloud account, then you've got a

26:55

massive problem. And so long as they

26:57

can then, in the case of one

27:00

password, have your master password and get

27:02

into the keychain. So what's the

27:04

risk and the controls that are around that?

27:06

Different story. So I just think we get

27:09

a little bit too caught up in, is

27:11

this genuinely MFA or not? or

27:14

Turfay, or Multistur. Ah, it's definitely

27:16

Multistur, let's agree on that. I

27:18

must see other comments here. Stefan

27:21

says, one password has past key

27:23

support, but it's in preview. Okay,

27:26

well then at least that signals

27:28

what's coming, right? Phil Rossman is

27:30

in West Virginia. On my way

27:33

to Amsterdam tomorrow. Love what you

27:35

do, Troy. Thanks, man. Amsterdam's cool

27:37

too. Really, really, really good fun.

27:39

I lived in the Netherlands for

27:41

two years. I enjoy it. Cool

27:43

people. Find a windmill, get a

27:45

beer, relax. Scott says, do we

27:48

have any concern about the

27:50

scenario where pass keys aren't

27:52

supported by the client? And I've

27:54

thought about this as well. This

27:56

is where it gets super super

27:58

messy because very... very often, let's

28:01

say the client is a TV, and

28:03

it's some, let's just say it

28:05

is a smart TV, and you've

28:07

turned on past keys for Netflix,

28:09

and then, well, Netflix is one of

28:11

the highest requested ones for past

28:14

keys, you've turned on past keys,

28:16

but then the client on the

28:18

TV doesn't support it. there are

28:20

implementations where a QR code can

28:22

be shown and then you use

28:24

a device that does have the

28:26

pass key sync to scan the

28:28

QR code. Now try explaining that

28:30

to the normies, right? Like now, now

28:33

it's a really, I said it

28:35

again didn't know, try explaining that

28:37

to the normal people because now

28:39

it gets really really hard to

28:41

throw in yet another spanner into

28:44

the works about explaining why you

28:46

need pass keys. Let's

28:48

imagine Netflix starts supporting it. And

28:51

there are so many account taker

28:53

attacks on Netflix, it's nuts. Going

28:55

to X and search for Netflix

28:57

hacked. I've done this in public

28:59

talks before because it's just really

29:01

fun to see the responses. And

29:04

when I say fun, it's sad. But what's fun

29:06

about it is that when you search

29:08

for Netflix, just do it. I haven't

29:10

done this for quite a while.

29:12

Let's go to X now. Netflix

29:15

hacked. So many of the results

29:17

have been around things like, help,

29:19

someone hacked my Netflix and

29:22

now everything's in Portuguese. What

29:24

else is on here? There's

29:27

actually some stuff about

29:29

people being hacked on Netflix,

29:31

which does conflate the results.

29:33

Here you go, this person

29:36

here. In Ireland, only a few

29:38

days ago, someone hacked my Netflix

29:40

account. And I keep losing access

29:42

to it. Now do you think someone

29:44

hacked Netflix? Or do you think

29:46

Joan has a dog with the same name

29:49

as someone else's and was born

29:51

in the same year? What are

29:53

the chances? It's happened five times in

29:55

10 days. Now I wanted

29:57

to complain. Netflix had no

29:59

complaint. procedure. They just say

30:02

they'll escalate as feedback. Maybe

30:04

get a password manager

30:06

but don't install pass keys because

30:08

you can't use pass keys on

30:11

Netflix and even if you could

30:13

maybe your TV wouldn't

30:15

support it. Jones or normal

30:17

person which makes it very

30:20

hard to explain all this.

30:22

Hmm. Oh there's just so much stuff

30:24

on here. All right so yes that

30:26

is that is a problem. What

30:29

else we got here? Scott says,

30:32

we've had pretty good support across

30:34

mainstream browsers since early 2024, but

30:36

we know that people suck at

30:38

updating stuff. Yeah, at least mainstream

30:41

browsers these days will auto update.

30:43

Remember the days when you

30:45

had to manually update your browser

30:47

and particularly those of us working

30:49

in any sort of web development

30:51

and you had to go and

30:53

test everything. Oh my God, that's

30:56

glad that's a memory already.

30:58

Now it's got to just

31:00

point out pastkeys.dev slash

31:02

device support. What's on

31:04

pastkeys.dev? Who runs that? I

31:06

have seen this the other day. Okay,

31:08

so yeah, good run down

31:11

here on pastkeys.dev about

31:13

the device support from

31:15

different devices for past

31:17

keys, and most things

31:19

just eyeballing it. I've got

31:21

green ticks for certainly all

31:23

the basic capabilities,

31:25

which is good. Passkeys or

31:28

Dev Hello Passkeys Good by

31:30

Passwords get started. Passkeys

31:33

are. Intuitive! I mean a lot

31:35

of this is good.

31:37

They're automatically unique, they're

31:39

breech resistant, they're fishing

31:42

resistant, I love this

31:44

but intuitive. Creating and

31:47

using passkeys is as

31:49

simple as consenting to save

31:51

and use them. No having to

31:54

create a password. Unless you're

31:56

creating a pass-go on

31:58

LinkedIn. I will spend more

32:00

time reading this. I often tend to

32:03

just like start writing based on what

32:05

I know and then I research and

32:07

then I rewrite some stuff and I

32:09

fill in the gaps. Scott says TV

32:11

example is fair and I agree they

32:14

should find alternative solution but what about

32:16

corporate devices but corporate devices in terms

32:18

of like corporate laptops or corporate

32:20

mobile devices I mean we've got

32:22

support across all of those. So

32:24

at least in a corporate environment

32:27

I often said this when some of

32:29

you know you're as Scott and I

32:31

do, you do a workshop or an

32:33

internal talk or something and someone will

32:35

go, you know, what about password managers

32:38

for our, encouraging our password managers or

32:40

our employees to use password managers

32:42

or what about rolling out

32:44

security keys? And so, well, you own

32:46

their assers, so really it's up to

32:49

you. What's a little bit different as

32:51

if you're, let's say you are LinkedIn

32:53

and you have normal everyday consumers, you've

32:56

got to be cautious not to create...

32:58

barriers to entry that might keep your

33:00

customers out. But if you're a

33:02

corporate and you mandate the use

33:04

of past keys or universal two-factor

33:06

keys or whatever oath message you

33:08

want, then so long as you

33:10

provide the equipment for everybody, which

33:13

of course may have a cost, then

33:15

they just have to do what you

33:17

say, which is advantageous. Scott says

33:19

corporate, things that aren't updated regularly

33:21

properly. Yeah, or they're different

33:23

problems. But I think for

33:25

the most part. the corporate

33:27

stuff where we would apply

33:30

passwords is going to be

33:32

my past keys is going

33:34

to be mobile devices and

33:36

operating systems and PCs and

33:38

I guess it depends on how far

33:40

back you go doesn't it in terms

33:42

of whether they support. Scott says

33:45

I just know two if a

33:47

lookouts are a huge support burden

33:49

on report your own and past

33:51

keys so I think when he

33:53

said look at I mean that

33:56

does say lockouts. I have another

33:58

Guinness Troy. So Scott

34:00

knows, after spending all these

34:02

decades looking at a PC, my

34:05

eyes are not great at the

34:07

moment. And past keys scare me

34:09

as a more complex thing and

34:11

therefore a heavier burden. Yeah, that's

34:13

part of the problem because on

34:15

report ERI, 2FA supported, 2FA

34:18

can be done with an

34:20

O2P bioethanicator app. The irony,

34:22

then Scott know discusses many

34:24

times before the irony of

34:26

this model is people. Go to

34:28

report your eye, they create an account,

34:31

and then they set up two-factor,

34:33

multi-factor, multi-factor, multi-factor, whatever we want

34:35

to call it, with a soft

34:38

token, on the basis of telling

34:40

Scott, hey look, if someone comes

34:42

back later on, they have the

34:45

right email address and the right

34:47

password, but they don't have the

34:50

token, don't have the token, don't

34:52

let them in. And then they

34:54

lose their token, because they've got

34:57

just going on. Now we have

34:59

to fall back to manual human

35:01

support tickets and verification, which

35:03

then burdens Scott. So everyone

35:06

says pass key support on things

35:08

like TV. Can I display QR code?

35:10

Did you leave the room and we're

35:13

talking about this? We just had

35:15

this discussion. You can then scan

35:18

with the device. Yep. That's

35:20

exactly what I said. I agree

35:22

with you, Stephen. Good stuff, mate.

35:24

All right. I miss you

35:26

guys. Let's move on to something

35:29

else. Also related

35:31

to Stefan. So we spent

35:33

a lot of time in Iceland

35:35

earlier this week with Stefan.

35:38

Also with Ingeber. So Ingeber

35:40

is a guy in Iceland

35:42

who is doing the web

35:44

front end for Have I

35:46

been paying the UX rebuild.

35:48

If everyone would like to see

35:51

how this is going, if you

35:53

go to... preview. Have I been

35:55

paying.com you will see a static

35:57

H.T.M. website which is the new brand.

35:59

And all in Bootstrap with a very

36:02

nice visual style, I think. It is

36:04

all static. There is a little bit

36:06

of JavaScript to make things feel

36:08

like they're a bit dynamic, but

36:10

nothing is posting to the server,

36:13

pulling back from server. So Ingeber

36:15

has been doing this front end.

36:17

And one of the big things

36:19

that Stefan and Charlotte and I

36:21

did, particularly over Tuesday, wasn't it,

36:23

mate, is we went through and

36:25

listed every single screen. that we

36:28

want to migrate over from the

36:30

old site to the new site and

36:32

we have put them all in as

36:34

issues. So if you go to gethub.com,

36:36

fod slash have I been poned, fod

36:38

slash ux dash rebuild, you will see

36:40

an issue for every single screen that

36:42

needs to be built. What you won't

36:44

see is we've created a

36:46

project under that organizational account

36:48

on get hub to prioritize

36:51

everything, give the work to

36:53

Ingebert. But a couple of things sort

36:55

of dawned on us while we were there

36:57

in terms of how we can make this

36:59

better and a lot of this centers around

37:02

the concept of a dashboard. So have I

37:04

been partners we know it at the moment?

37:06

You go to the front page, you put in

37:08

an email address, you do the search and you

37:10

get results. And then there are

37:12

places where you need to be

37:15

effectively authenticated first. I say effectively

37:17

because we do magic links. which

37:19

are not actually magic, they're just

37:21

unique links that get sent by

37:24

our email, you click on the

37:26

link and then you're logged in. We

37:28

do that when you want to purchase

37:31

or manage an API key, we also

37:33

do that when you want to do

37:35

domain searches or purchase a subscription for

37:37

that, and then we also do that

37:40

when you want to sign up for

37:42

notifications, and then we piggy back off

37:44

the notifications thing in order to do

37:47

searches for sensitive email address. And we're

37:49

going to roll all that stuff up

37:51

into a concert called Dashboard.

37:54

So everybody will have a

37:56

personal dashboard. And you'll see

37:58

that already in the UI. Actually,

38:01

because I'm not lying here, that

38:03

isn't that one. Yep, top right

38:05

is a big button says dashboard.

38:07

And then when you go into

38:09

your dashboard, I think Ingeber is

38:11

probably even link that in. Verify

38:13

your identity. You'll verify

38:15

your control email address and

38:17

then you'll have a couple of brand

38:19

new pages. Now one of them is

38:22

going to be a personal dashboard summary.

38:24

Now I think we put this in

38:26

here somewhere. dashboard page, API documentation, that's

38:28

in his summer in the list. But

38:30

the idea of this is to try

38:33

and give people a summary for them

38:35

that covers the sensitive data breaches,

38:37

covers the Stearler logs, covers things

38:39

that we may add later on,

38:41

which are specific to the individual

38:43

that require identity verification first. So

38:45

you'll be able to wake your

38:47

email address in there, go to

38:49

that page, see that, and then

38:51

we'll be able to do things

38:54

like some aggregated rollups. How many times

38:56

have you had your email address

38:58

exposed? How many times is

39:00

your password being exposed? Your date

39:02

of birth. Let's build a picture

39:04

of what that exposure looks like.

39:07

Now we're building all of this

39:09

in the public domain. She'll

39:11

see the other. She's like, what

39:13

if another company sees that and

39:15

they steal the idea and they do

39:17

it? And we were kind of like, well...

39:19

That's good, because we think it's

39:21

a good idea. Maybe other people

39:24

can then do the same thing.

39:26

Also, once we make it live,

39:28

anyway, people can do it. So,

39:30

we are targeting, at the moment,

39:32

what do we say, Stefan, May

39:34

17, I think to go live, which

39:36

is a weekend. So, we've got

39:39

about five, six weeks, to go

39:41

before we want to have this

39:43

live. There will be the personal

39:45

dashboard page. We will also have

39:47

a personal search page which will

39:49

show you things like sensitive data

39:52

breaches. It will show you if

39:54

you have chosen the opt-out mechanism

39:56

which hides your results publicly but

39:58

still keeps on having... Just a

40:00

bunch of other stuff that we're

40:02

building in the public domain

40:04

because we really want feedback

40:06

from people. And we have had

40:09

lots of good feedback, we've had

40:11

some really good issues raised,

40:13

and they're little things which

40:15

just perfectly tap into the OCD

40:18

side of my brain. And I'll

40:20

give you a good example of

40:22

this. If you go to preview.jo.jo.com.

40:25

And you'll see there's a

40:27

search box just like on the front

40:29

page. And that says email

40:31

address and the search box is

40:33

quite wide and the check button

40:35

is inside the search box. Now

40:38

both the check button and the

40:40

search box have a radius on

40:43

the corners. They've got rounded corners,

40:45

which looks lovely. And someone must

40:47

have just like super zoomed in

40:50

and said, because the radius

40:52

of the check button is the same

40:54

as the surrounding box, yet there's padding

40:57

on it, and it sits inside. it

40:59

looks weird and you need to make

41:01

the radius of the corners on the

41:03

check button tighter than the radius on

41:06

the surrounding box. I was like, holy shit

41:08

he's right. Like we had screwed that up

41:10

and I know that that's a minor

41:12

thing but we've had other feedback around

41:14

things like a lack of contrast on

41:17

some icons which is really important because

41:19

that's going to be the sort of

41:21

thing that there are we some people

41:23

who might have for example visual impairments

41:25

that will pick that up where the

41:27

rest of us won. So we really

41:29

want that we really want more

41:32

feedback on How should these features

41:34

work? You know if we're going

41:36

to have a dedicated like personal

41:39

overview dashboard page? What else should

41:41

we put on there? Like there's

41:43

probably other stuff that we can

41:45

now do that we've just never

41:47

thought of before And I'd really

41:50

like to see that All right, look

41:52

at these comments Steve and I

41:54

bought some yubie keys two years ago

41:56

But honestly not understand when they

41:58

really should get used because everyone still

42:01

uses passwords or forces me to

42:03

use my phone when it's low. Well,

42:05

I actually just reminded me, I

42:07

was going to say earlier on

42:09

someone mentioned Google Advanced Protection. So

42:12

I wrote this blog post about the

42:14

sort of the hierarchy of 2FA.

42:16

I feel it was early COVID time,

42:18

so maybe five years ago. And I

42:21

wrote specifically about Google Advanced Protection

42:23

because it's a really really solid implementation

42:25

where you can use physical U2F

42:27

keys as the second factor exclusively. So

42:29

if you turn on all of

42:31

the Google Advanced Protection knobs you

42:33

will have to be able to

42:36

authenticate yourself with the username password

42:38

security key and I feel there

42:40

are one or two other checks

42:42

and probably things that aren't immediately

42:44

obvious to us there as well. But

42:46

where we're ultimately going to end

42:48

up is... No turf A, fishable

42:51

OTPs, past keys, physical tokens. Yeah,

42:53

these four sort of different options.

42:55

We know I don't want the first

42:57

one because that's crap, that's no

42:59

turf A. We know the problem

43:02

with the second one, that's Troy

43:04

getting his mail chimpless pound. So,

43:06

past keys and physical keys, where

43:08

are we left? And this is

43:10

probably going to be a good

43:12

blog post in and of itself.

43:14

But to me, the answer can

43:17

be answered in or rather... The

43:19

question can be looked at in

43:21

two different ways. One is the

43:23

prevalence with which the second factor

43:25

gets requested. If you are being

43:27

asked for something every day and

43:29

you need to go and find

43:31

a physical key, there's a high

43:33

usability barrier. The other is the value of

43:36

the asset being protected. Now, I'll

43:38

give you an example. If it

43:40

was something that every single day

43:42

I got challenged on and it

43:44

would be bad to get it owned,

43:46

but it would not be financially destructive

43:49

or otherwise catastrophic, I might use a

43:51

passkey. The risk being that if someone,

43:53

for example, can get into my one

43:55

password and they can get the synced

43:58

passkey, then they can get in. If it was...

44:00

crypto and its actual money, then

44:02

I'd probably rather have the physical

44:04

security key, because that's also something

44:06

that I rarely go into. It's

44:08

rare that I have to authenticate

44:10

to my crypto wallet of, will

44:12

it provider, of choice. So when I

44:15

do that, I don't mind a bit

44:17

of extra inconvenience, especially given the

44:19

impact of it financially if someone

44:21

else gets into the account. So

44:23

I think that's a pretty good

44:26

example of where you might look

44:28

at these two strongest forms of

44:30

authentication we have and sometimes use

44:33

one and sometimes use the other.

44:35

All right, what else is here in the

44:37

comments? Soft or Tia, I really

44:39

don't want to start authenticating

44:42

via some dangerous things device

44:44

implanted in my hand. I'm told

44:46

this is off the mark. This is

44:48

the mark of the beast. Now Scott

44:51

does everything implanted in his hand. Where

44:53

are you actually using

44:55

that these days Scott? Because Scott

44:57

got a little chip in his

45:00

hand. I haven't been seeing you.

45:02

When I see you buying coffee

45:04

with that or be impressed.

45:06

It'll be like, remember very

45:09

early on, remember very early on

45:11

if you paid with your watch.

45:13

And people at the shop are

45:15

like, wow, that's cool. I

45:17

haven't seen that people. And

45:19

now it's just like, yeah, who

45:21

cares? There's no actual

45:24

functionality there. Yes, exactly

45:26

what I just said. I said

45:28

that. We'll play it back later.

45:30

All the functionality you see on

45:32

the previous site is just emulated

45:34

for demo purposes. I did realize,

45:36

Stefan, so some of that functionality,

45:39

like what, so today, Ingeber implemented

45:41

the FAQ stuff, so what we've

45:43

done on the FAQs page, and

45:45

everyone will see this live now,

45:47

because I merged that change earlier

45:50

today, is all the FAQs collapse. and

45:52

we were looking at it the other

45:54

day and someone had raised an issue

45:56

saying because all the FAQs collapse you

45:58

can't control F. and find it on

46:01

the page because they're effectively now in hidden

46:03

dives. So Engelberg's put a little search box

46:05

across the top and then you can type

46:07

in the text and as you type in

46:10

the text it just expands anything that matches

46:12

which is a pretty neat way of doing

46:14

it. I still think you can probably bind

46:16

control F to maybe focusing on the box as

46:18

well. Focusing on the box maybe pre-filling it

46:20

when you do the find. Can you do

46:23

that? I don't know. Any who, that's done

46:25

client side. but he's been putting the

46:27

client's side in inline script in the

46:29

source code, does that? The client's side,

46:31

he's been putting the JavaScript in inline

46:34

script in the source code. So we

46:36

need to, because we're not going to

46:38

allow unsafe in line in our CSP,

46:40

we need to now get him to

46:42

put all that in separate JavaScript files

46:45

and just embed them in the page,

46:47

which I added that issue earlier today.

46:49

So we'll be able to sort that

46:51

out. Stephen says, and if people don't

46:54

understand, they're easy to manipulate

46:56

by scammers. This is part

46:58

of the problem. Like, because

47:01

the current landscape for pass

47:03

keys is now so complex,

47:05

later on, when people come to

47:07

use them, are they going to

47:10

be more at risk of

47:12

manipulation because they can have

47:14

concepts thrown at them, which

47:16

seem very, very unusual. I'll

47:18

rephrase that. Concepts thrown at them

47:20

that they don't understand which could

47:22

be to their disadvantage. Now you

47:24

could argue that if you do

47:26

pass keys properly, then that can't really

47:29

happen anyway because you can't fish the

47:31

pass key. But could you potentially fish

47:33

recovery information? How do you recover?

47:35

Let's say you legitimately you lose your

47:38

pass key. And again this is going

47:40

to be up to every single site

47:42

to decide how they implement it. You've

47:44

legitimately lost your pass key. You need

47:46

to get back into the service. You've

47:49

gone to some fishing page,

47:51

the fishing page effectively emulates

47:53

the recovery process. And are we

47:55

then back to square one? But

48:00

yeah, I think that's a very, very

48:02

valid point, David. We create other

48:04

risks. And the fascinating thing about

48:06

this is we're having a discussion

48:09

about the human side of security.

48:11

And there's all of this, like

48:13

you have Fido Alliance, this, and

48:15

you twift that, and you're cryptographyically

48:18

signed and transmit over security. Like

48:20

all of that is wonderful. But

48:22

then you have the meat bags. I

48:24

tell you, it didn't like norm, you're

48:27

not going to like meatbag. But that's

48:29

all of us, right? Every single one

48:31

of us has then got to make

48:34

human decisions about our security.

48:36

And that's very easy to

48:38

break compared to breaking the

48:40

cryptographic implementations of

48:42

the things we just spoke about. Wayne.

48:45

is the dashboard page built out. Some

48:47

stuff is. So Wayne, one of the

48:49

data, and I'm going to double check

48:52

it here, one of the dashboard pages

48:54

that is built out for a large

48:56

part is the domain search page. There

48:58

are changes I think we want to

49:00

make. You'll see that raised in the

49:03

issues log. But if you go

49:05

domain search, you'll see verify new

49:07

domain. You'll see a nice little

49:09

model and the verify options there.

49:11

If you click on Verify Now, after

49:14

you put something that passes validation

49:16

into the domain name, you will

49:18

see the one thing that has

49:20

had some of the best feedback

49:22

we've had so far, which is a

49:24

little animating icon of the new

49:27

Have A Bampone logo. And people,

49:29

honestly, people love that. We

49:31

have so much nice feedback about that.

49:33

What we want to do with the

49:35

domain search page, and again, you'll

49:37

see this in public issues, is...

49:39

simplify the page that lists your

49:41

domains a little bit and then

49:44

when you click on a domain rather

49:46

than just running the search straight

49:48

away give a little bit of

49:50

a summary explain some of the

49:52

high-level numbers and then allow people

49:54

to run a search that just

49:56

returns results to the browser or

49:58

Jason or Excel and probably also

50:00

add some filtering because we've

50:02

got subscribers out there

50:04

using domain search that have

50:06

got domains with hundreds of

50:08

thousands of results in them. So

50:10

I think what we need to do

50:13

is some sort of default to the

50:15

effect of by default only show me breaches

50:17

from the last 12 months or

50:19

something to that effect. So anyway

50:21

have a look at that and incidentally

50:24

anyone can chime in

50:26

on these ideas. So if you read through

50:28

there and you go... I've got a better

50:30

idea or I don't like that idea. Leave

50:32

a comment. Or make a pull request

50:35

and grab the code. Have a

50:37

play with it. Bitcoin Dev Japan

50:39

says one issue we ran into

50:41

was a weak password user had

50:43

someone hack their account and set

50:46

up passkey login and disable password

50:48

login. It was difficult to handle.

50:50

We froze our account just to

50:53

be sure. Yeah, well I mean

50:55

that's that is a problem isn't

50:57

it. You

51:01

could argue it's the same thing. You could

51:03

argue it's the same thing if someone can

51:05

log in and change the password. Now, does

51:07

a change password require a second validation

51:10

step, which is sending an email address

51:12

and you've got to confirm there? But

51:14

if you can get access to someone's

51:16

account, there are multiple different ways, with

51:18

or without a pass key, where you

51:20

can then denial of service them, back

51:22

into the account. So yeah, you're right,

51:24

that's a problem. And

51:26

as Bitcoin Dev Japan has gone on

51:29

to say, so the hacker had the

51:31

pass key. Cybersecurity is hard. It is.

51:33

That's why it's a good industry to

51:35

be. There's lots of challenges to be

51:37

solved. Stephen says it's the ex-case CD

51:39

comic. Superencrypted laptop versus Dragun

51:41

used this wrench to get

51:43

the person's password. People are

51:45

always the weak point. So the comic

51:48

Stephen's talking about is that old

51:50

ex-case CD classic which must be

51:52

like 10 years ago or something

51:54

where... It's effectively comparing the difficulty

51:56

of the technical controls to get

51:58

someone's password versus... Let's just hit

52:01

the person over the head with

52:03

this wrench until they tell us

52:05

the password. There are probably some

52:08

parts of the world where that's how

52:10

they get passwords out of

52:12

people. Scott's found it there,

52:14

thanks mate. Rob says one

52:16

option is only breeches since

52:18

I last visited, when you're in

52:20

domain search. Then we have to

52:22

track when they last visited.

52:25

My inclination. thinking about

52:27

this totally on the

52:29

fly after most of a

52:31

Guinness is give them options

52:33

to say just show me

52:36

from the last breach because

52:38

very often people come there

52:41

every time they get to know

52:43

this so just show me the

52:45

last bridge show me the last

52:47

year show me everything last

52:50

one my time out

52:52

depending on how big your domain

52:54

is The Osinam network

52:57

says tracking client side is

52:59

also an option if you're

53:01

referring to tracking Since the last

53:03

breach client side. Well, then we

53:05

effectively come back to needing to

53:07

either set a cookie on the

53:09

individual or Flag their record such

53:11

that if they when they come

53:13

back in later on we can

53:15

say this is when you're last

53:17

here. I still think those three

53:20

options possibly just defaulting to Show

53:22

me just the last breach is

53:24

probably the most logical thing And then

53:26

Stefan we've got to figure out, given

53:28

that we cashed domain searches at cloud

53:31

flare, we then need to pass those

53:33

parameters to the worker and get the

53:35

worker to filter at that point because

53:37

one thing we want to do now

53:40

compared to before, we moved as much

53:42

as we could over into azure functions

53:44

because we wanted it to be serverless,

53:46

which runs on servers, so it would

53:49

scale as best as possible, which means

53:51

at the moment, you do a search for

53:53

a domain and it's hitting API which

53:55

binds to the functions,

53:57

and it's literally an...

53:59

your function, emitting like in-line HML,

54:01

it's dirty, I feel dirty for having

54:04

done it. But it gave us great

54:06

scalability. And what we want to do

54:08

now is effectively just have a static

54:11

HTL, a near static HTL page, and

54:13

then we'll ace in client side just

54:15

call the API implant, we'll return Jason,

54:17

and then we can at the cloud

54:20

for the level we can filter that

54:22

Jason down to whatever it needs to

54:24

be. So, we'll solve that's not a

54:27

hard problem that one. All

54:30

right, folks, I think that's, that

54:32

actually is about it. So, hmm.

54:34

On that night, we're at, we

54:36

are now at 5 p.m., which

54:38

is officially beer a club

54:40

in Ireland. So I'm going

54:42

to wrap this up. We

54:44

are heading back to Australia

54:46

on Thursday next week. I'll

54:48

do this video from Australia.

54:52

on Saturday. I think it's Saturday. So

54:54

yeah, I'll be back home for then.

54:56

I'll be back home for a very

54:58

short period, but I will be home

55:00

in time to do this. So hopefully

55:02

I can go the next week without

55:04

getting more fished. I just said more

55:06

because I read Stephen's passage says Troy

55:08

needs more Guinness. Or something to that

55:10

effect. It's a really really nice spot

55:12

here. I'll try and get some photos

55:14

and post them. Probably learn my Facebook

55:16

later on. Thanks for joining folks.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features