Critics urge end of passwords, but alternatives not ready for prime time

With no practical alternative, a small tech group has launched a campaign to rally consumers against the use of passwords for logging into websites and services.

The Petition Against Passwords, launched on Wednesday, is the brainchild of think-tank TechFreedom and rivals Clef and LaunchKey, which sell password-less technology. As of Thursday, the group had several hundred signees.

The idea is to put aside the technology debate in finding a password replacement and use the power of the people against the widely used method for logging into websites.

"If we can combine all the voices of the people who in the past have been silent about their issues with passwords and bring them together and be like, 'Hey, this is an issue that we need to be talking about,' then as a group, we can enact a lot more change than we would be able to individually," said Jesse Pollak, co-founder of startup Clef.

The security weaknesses of passwords are well known. Hackers regularly break into website databases, steal passwords and then use them to access user accounts. Even when passwords are encrypted, criminals often can find ways to crack them.

On its website, the Petition Against Passwords lists victims of some of this year's high-profile password breaches, including Living Social, Evernote, Twitter and Drupal.

Nevertheless, passwords continue to be used because no practical alternative exists, said Matthew Green, assistant research professor and cryptography expert at Johns Hopkins University.

[Also see:Ã'Â Despite hopeful initiatives, demise of passwords years away]

"We'd would all love to come up with something better than passwords," Green said. "The reason we haven't done it in the last 10 years or so -- or 20 years maybe -- is just that nobody can agree on something that is better than passwords."

While there are more secure alternatives, they are often more difficult or more expensive for the user. Biometrics, such as a fingerprint or facial scanner, is often touted as an alternative, but it has not been built into most smartphones and tablets and usually requires separate hardware on a personal computer. Other possibilities, such as electronic tattoos and measuring brainwaves,Ã'Â are still in the experimental stage.

In the case of password-less alternatives from vendors such as Clef, LaunchKey and OneID, the technology is proprietary, so getting widespread adoption by websites is difficult.

For example, Clef only has about 250 websites supporting its technology. "On the grand scheme of things, that's not that many," Pollak said.

The Fast Identity Online (FIDO) Alliance is a nonprofit organization that has been working for two-and-a-half years on replacing passwords with standards-based technology. The system would enable a website to authenticate a visitor through the connecting device.

FIDO, which Google joined in April, expects to have production-ready specifications available for building technology into devices and website servers by early next year.

FIDO's success will depend on many major Internet companies, not just Google, adopting the technology, as well as smaller sites and hardware manufacturers.

Whether FIDO is successful or some other password alternative, the bottom line for consumers is that the level of security will likely be higher, but never bulletproof.

"Everything has a weakness," Green said. "Anytime anybody says it's impossible to hack, your alarm bells should go off."

While passwords remain the primary means of authentication, most experts would recommend using a password manager, such as LastPass, IronKey or Kaspersky Password Manager, for safe storage and to avoid having to remember more than one.

Read more about access control in CSOonline's Access Control section.

Join the CSO newsletter!

Error: Please check your email address.

Tags EvernoteIdentity & Access | Access ControlNetworkingLaunchKeyaccess controlIdentity & AccessmanagementFIDO AllianceClefPetition Against PasswordssecurityTechFreedomAccess control and authenticationtwitter

More about EvernoteGoogleKaspersky

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place