Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

He who enters his wife's dressing room is a philosopher or a fool. -- Balzac


aus+uk / uk.d-i-y / USB security keys

SubjectAuthor
* USB security keysDavid Paste
+* Re: USB security keysJohn Rumm
|+* Re: USB security keysSH
||`- Re: USB security keysJohn Rumm
|`* Re: USB security keysHandsome Jack
| +* Re: USB security keysJohn Rumm
| |`* Re: USB security keysHandsome Jack
| | `- Re: USB security keysJohn Rumm
| `- Re: USB security keysPaul
+- Re: USB security keysJethro_uk
`* Re: USB security keysPeter Johnson
 `* Re: USB security keysalan_m
  `- Re: USB security keysPeter Johnson

1
USB security keys

<urj338$2opn1$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125638&group=uk.d-i-y#125638

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!news.hispagatos.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: pastedavid@gmail.invalid (David Paste)
Newsgroups: uk.d-i-y
Subject: USB security keys
Date: Mon, 26 Feb 2024 22:24:41 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <urj338$2opn1$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 26 Feb 2024 22:24:41 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="ea08d72c9879662b0bb2f9d9585182f9";
logging-data="2909921"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18zLeUrIatDiFurNxfsSO18zwtrjF3DOJM="
User-Agent: Pan/0.149 (Bellevue; 4c157ba)
Cancel-Lock: sha1:KOScUeceqgr09TNBNlVT5FDjNtI=
 by: David Paste - Mon, 26 Feb 2024 22:24 UTC

Anyone got anything good or bad to say about them?

Do they work with linux as well as Windows?

I don't have a clue about them, but a youtube channel I watch has been
hacked twice in a month despite 2FA and all that jazz. He mentioned it
might be time for a security key, hense my question here.

Also, if 2FA hasn't stopped a hacking attempt, what use is it?!

Thanks for reading, and thanks for any answers being written at a 5 year
old's level!

Re: USB security keys

<urjh8b$2s3u6$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125646&group=uk.d-i-y#125646

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: see.my.signature@nowhere.null (John Rumm)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 02:26:18 +0000
Organization: Internode Ltd
Lines: 47
Message-ID: <urjh8b$2s3u6$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 27 Feb 2024 02:26:19 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="81bfde61987b4623eb68b7dec5eba60d";
logging-data="3018694"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+bogFr0H1Tm75tpApqxQGPsN9ROIUnohI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:cktH0eShtO7Nr/aGqclnTUuQ/gQ=
In-Reply-To: <urj338$2opn1$1@dont-email.me>
Content-Language: en-GB
 by: John Rumm - Tue, 27 Feb 2024 02:26 UTC

On 26/02/2024 22:24, David Paste wrote:
> Anyone got anything good or bad to say about them?
>
> Do they work with linux as well as Windows?
>
> I don't have a clue about them, but a youtube channel I watch has been
> hacked twice in a month despite 2FA and all that jazz. He mentioned it
> might be time for a security key, hense my question here.

> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!

The main problem with 2FA on sites like youtube is that it is not really
being used that well. It is setup for convenience and ease of use rather
than strong securty.

The 2FA is used to establish a session, but that session is then made
semi permanent by use of session cookies. So once the platform has
passed the 2FA, it is then in effect left logged in for an extended
periods of time. Most of the compromises seem to be based on stealing
those session cookies, and then transplanting them to the attackers
system. Low and behold, their browser is then automatically logged into
the account with no need for further 2FA checks.

2FA ought to be required for every login, with a inactivity timeout that
logs out of the account if not used for 30 mins etc.

It is also not a good idea to use the machine that is used for
interacting with the account, uploading etc, for non related tasks like
admin and email. If you only have one machine, do all the admin stuff
inside a virtual machine, that is never used to access the account. That
way even if it is compromised, there are no sessions to hijack.

> Thanks for reading, and thanks for any answers being written at a 5 year
> old's level!

--
Cheers,

John.

/=================================================================\
| Internode Ltd - http://www.internode.co.uk |
|-----------------------------------------------------------------|
| John Rumm - john(at)internode(dot)co(dot)uk |
\=================================================================/

Re: USB security keys

<urk3vh$fh2f$15@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125647&group=uk.d-i-y#125647

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jethro_uk@hotmailbin.com (Jethro_uk)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 07:45:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <urk3vh$fh2f$15@dont-email.me>
References: <urj338$2opn1$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 27 Feb 2024 07:45:53 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="73d5a8b716670e77a3be75e6b06268bf";
logging-data="509007"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19JYOJDGkBfscpxQVg1QZPhokkquZM17Nk="
User-Agent: Pan/0.146 (Hic habitat felicitas; 8107378
git@gitlab.gnome.org:GNOME/pan.git)
Cancel-Lock: sha1:BHHEmCKSPWgcQnQitcIEBmmRb64=
X-No-Archive: Yes
 by: Jethro_uk - Tue, 27 Feb 2024 07:45 UTC

On Mon, 26 Feb 2024 22:24:41 +0000, David Paste wrote:

> Anyone got anything good or bad to say about them?
>
> Do they work with linux as well as Windows?
>
> I don't have a clue about them, but a youtube channel I watch has been
> hacked twice in a month despite 2FA and all that jazz. He mentioned it
> might be time for a security key, hense my question here.
>
> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>
> Thanks for reading, and thanks for any answers being written at a 5 year
> old's level!

TL;DR is that they are better thank nothing. Think of them as locking
your car which deters 90% of casual attacks.

I know SMS based 2FA is susceptible to hijacking (due to poor security on
the telcos part). But (and this applies to a lot of cases) there is a
certain amount of effort needed which tends to eliminate a lot of
potential victims.

Re: USB security keys

<urk404$333s9$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125648&group=uk.d-i-y#125648

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: i.love@spam.com (SH)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 07:46:12 +0000
Organization: A noiseless patient Spider
Lines: 54
Message-ID: <urk404$333s9$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 27 Feb 2024 07:46:12 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="8348077c678675cfa144d2be9d4c76b5";
logging-data="3248009"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18uKQYmH2MPm4OUcvTWtQRguegQ4bIQjVQ="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:5JP1a3oQxm5sWRWmPee2xcySre0=
In-Reply-To: <urjh8b$2s3u6$1@dont-email.me>
Content-Language: en-GB
 by: SH - Tue, 27 Feb 2024 07:46 UTC

On 27/02/2024 02:26, John Rumm wrote:
> On 26/02/2024 22:24, David Paste wrote:
>> Anyone got anything good or bad to say about them?
>>
>> Do they work with linux as well as Windows?
>>
>> I don't have a clue about them, but a youtube channel I watch has been
>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>> might be time for a security key, hense my question here.
>
>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>
> The main problem with 2FA on sites like youtube is that it is not really
> being used that well. It is setup for convenience and ease of use rather
> than strong securty.
>
> The 2FA is used to establish a session, but that session is then made
> semi permanent by use of session cookies. So once the platform has
> passed the 2FA, it is then in effect left logged in for an extended
> periods of time. Most of the compromises seem to be based on stealing
> those session cookies, and then transplanting them to the attackers
> system. Low and behold, their browser is then automatically logged into
> the account with no need for further 2FA checks.
>
> 2FA ought to be required for every login, with a inactivity timeout that
> logs out of the account if not used for 30 mins etc.
>
> It is also not a good idea to use the machine that is used for
> interacting with the account, uploading etc, for non related tasks like
> admin and email. If you only have one machine, do all the admin stuff
> inside a virtual machine, that is never used to access the account. That
> way even if it is compromised, there are no sessions to hijack.
>
>
>> Thanks for reading, and thanks for any answers being written at a 5 year
>> old's level!
>

Windows 11 (and I think Windows 10 too) comes with Sandbox..... you will
need to enable VT-D or virtualisatino in the BIOS and also enable it in
the add/remove programs option in control panel.

Its easier to start up and use albeit a cut down version of full fat
windows and has Edge browser. once you exit Sandbox, its literally
thrown away and you start with a completely fresh new Sandbox, whereas a
VM would be persistent across restarts and reboots, If you get infected
in a VM, you'd have to roll back opr rebuild the VM, whereas with
Sandbox, just close down and restart.

If you want to print or have a diff browser then thats a bit of a faff
as you'd have to install every time you use Sandbox as its non-persistent.

SH

Re: USB security keys

<urk5b6$338tv$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125649&group=uk.d-i-y#125649

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jack@handsome.com (Handsome Jack)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 08:09:12 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 36
Message-ID: <urk5b6$338tv$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me>
Injection-Date: Tue, 27 Feb 2024 08:09:12 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="38c2a4d76ce30bffac0223ad74c5ecf7";
logging-data="3253183"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19YkbPWvioOyV4ciO15YJFCWk/03d5EyiY="
User-Agent: tin/2.6.2-20220130 ("Convalmore") (Linux/5.15.0-94-generic (x86_64))
Cancel-Lock: sha1:ZMAbJFnws7+whFnAvbREyCj5Hmg=
 by: Handsome Jack - Tue, 27 Feb 2024 08:09 UTC

John Rumm <see.my.signature@nowhere.null> wrote:
> On 26/02/2024 22:24, David Paste wrote:
>> Anyone got anything good or bad to say about them?
>>
>> Do they work with linux as well as Windows?
>>
>> I don't have a clue about them, but a youtube channel I watch has been
>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>> might be time for a security key, hense my question here.
>
>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>
> The main problem with 2FA on sites like youtube is that it is not really
> being used that well. It is setup for convenience and ease of use rather
> than strong securty.
>
> The 2FA is used to establish a session, but that session is then made
> semi permanent by use of session cookies. So once the platform has
> passed the 2FA, it is then in effect left logged in for an extended
> periods of time. Most of the compromises seem to be based on stealing
> those session cookies, and then transplanting them to the attackers
> system. Low and behold, their browser is then automatically logged into
> the account with no need for further 2FA checks.
>
> 2FA ought to be required for every login, with a inactivity timeout that
> logs out of the account if not used for 30 mins etc.
>
> It is also not a good idea to use the machine that is used for
> interacting with the account, uploading etc, for non related tasks like
> admin and email. If you only have one machine, do all the admin stuff
> inside a virtual machine, that is never used to access the account. That
> way even if it is compromised, there are no sessions to hijack.

Or set the browser to clear cookies each time it is closed?

Re: USB security keys

<urkapp$34lpp$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125652&group=uk.d-i-y#125652

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: see.my.signature@nowhere.null (John Rumm)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 09:42:17 +0000
Organization: Internode Ltd
Lines: 89
Message-ID: <urkapp$34lpp$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me>
<urk404$333s9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 27 Feb 2024 09:42:17 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="81bfde61987b4623eb68b7dec5eba60d";
logging-data="3299129"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1916tiUGP0KWa5F28TDYAqG47k18YFfzhY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:tZkHXiIiADS87uOM4uTXgmYCZYs=
In-Reply-To: <urk404$333s9$1@dont-email.me>
Content-Language: en-GB
 by: John Rumm - Tue, 27 Feb 2024 09:42 UTC

On 27/02/2024 07:46, SH wrote:
> On 27/02/2024 02:26, John Rumm wrote:
>> On 26/02/2024 22:24, David Paste wrote:
>>> Anyone got anything good or bad to say about them?
>>>
>>> Do they work with linux as well as Windows?
>>>
>>> I don't have a clue about them, but a youtube channel I watch has been
>>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>>> might be time for a security key, hense my question here.
>>
>>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>>
>> The main problem with 2FA on sites like youtube is that it is not
>> really being used that well. It is setup for convenience and ease of
>> use rather than strong securty.
>>
>> The 2FA is used to establish a session, but that session is then made
>> semi permanent by use of session cookies. So once the platform has
>> passed the 2FA, it is then in effect left logged in for an extended
>> periods of time. Most of the compromises seem to be based on stealing
>> those session cookies, and then transplanting them to the attackers
>> system. Low and behold, their browser is then automatically logged
>> into the account with no need for further 2FA checks.
>>
>> 2FA ought to be required for every login, with a inactivity timeout
>> that logs out of the account if not used for 30 mins etc.
>>
>> It is also not a good idea to use the machine that is used for
>> interacting with the account, uploading etc, for non related tasks
>> like admin and email. If you only have one machine, do all the admin
>> stuff inside a virtual machine, that is never used to access the
>> account. That way even if it is compromised, there are no sessions to
>> hijack.
>>
>>
>>> Thanks for reading, and thanks for any answers being written at a 5 year
>>> old's level!
>>
>
>
> Windows 11 (and I think Windows 10 too) comes with Sandbox..... you will
> need to enable VT-D or virtualisatino in the BIOS and also enable it in
> the add/remove programs option in control panel.

Yup Win 10 has it as well.

> Its easier to start up and use albeit a cut down version of full fat
> windows and has Edge browser.    once you exit Sandbox, its literally
> thrown away and you start with a completely fresh new Sandbox,

Indeed - it can be quite handy for testing software installs and all
kinds of things where you don't persistent storage of anything.

> whereas a
> VM would be persistent across restarts and reboots, If you get infected
> in a VM, you'd have to roll back opr rebuild the VM, whereas with
> Sandbox, just close down and restart.

First thing to consider is that the sandbox *is* a VM - sat atop
Hyper-V. It is just configured so that it boots from a known checkpoint
each time. You can achieve the same functionality with any VM platform
using checkpoints. You in effect just stick a stake in the ground, give
it a name, and then you can always revert to that point in time -
including reverting to the VM's file system as it was at the time of the
checkpoint. (although if you connect to a real network drive etc and
make changes to that, then those will not revert)

For your general email platform, you may want some persistence, since
you probably don't want to re-install and configure your email system
every morning, and wait for it to synch however many gig of email.

> If you want to print or have a diff browser then thats a bit of a faff
> as you'd have to install every time you use Sandbox as its non-persistent.

You can always create your own sandbox, where the starting point
includes all your baseline software and setup.

--
Cheers,

John.

/=================================================================\
| Internode Ltd - http://www.internode.co.uk |
|-----------------------------------------------------------------|
| John Rumm - john(at)internode(dot)co(dot)uk |
\=================================================================/

Re: USB security keys

<urkasn$34lpp$2@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125653&group=uk.d-i-y#125653

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: see.my.signature@nowhere.null (John Rumm)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 09:43:52 +0000
Organization: Internode Ltd
Lines: 52
Message-ID: <urkasn$34lpp$2@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me>
<urk5b6$338tv$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 27 Feb 2024 09:43:51 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="81bfde61987b4623eb68b7dec5eba60d";
logging-data="3299129"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18i9Sz+1jUoOwKqJU5uH51NFKEmYeON5VM="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:N4kx8FO/gKrW9ZJvxjWsDdUbTp0=
Content-Language: en-GB
In-Reply-To: <urk5b6$338tv$1@dont-email.me>
 by: John Rumm - Tue, 27 Feb 2024 09:43 UTC

On 27/02/2024 08:09, Handsome Jack wrote:
> John Rumm <see.my.signature@nowhere.null> wrote:
>> On 26/02/2024 22:24, David Paste wrote:
>>> Anyone got anything good or bad to say about them?
>>>
>>> Do they work with linux as well as Windows?
>>>
>>> I don't have a clue about them, but a youtube channel I watch has been
>>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>>> might be time for a security key, hense my question here.
>>
>>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>>
>> The main problem with 2FA on sites like youtube is that it is not really
>> being used that well. It is setup for convenience and ease of use rather
>> than strong securty.
>>
>> The 2FA is used to establish a session, but that session is then made
>> semi permanent by use of session cookies. So once the platform has
>> passed the 2FA, it is then in effect left logged in for an extended
>> periods of time. Most of the compromises seem to be based on stealing
>> those session cookies, and then transplanting them to the attackers
>> system. Low and behold, their browser is then automatically logged into
>> the account with no need for further 2FA checks.
>>
>> 2FA ought to be required for every login, with a inactivity timeout that
>> logs out of the account if not used for 30 mins etc.
>>
>> It is also not a good idea to use the machine that is used for
>> interacting with the account, uploading etc, for non related tasks like
>> admin and email. If you only have one machine, do all the admin stuff
>> inside a virtual machine, that is never used to access the account. That
>> way even if it is compromised, there are no sessions to hijack.
>
>
> Or set the browser to clear cookies each time it is closed?

Do you make sure you close all browser windows every time you access
email? Do you make sure that your machine does a secure erase of the
cookie storage every time as well?

--
Cheers,

John.

/=================================================================\
| Internode Ltd - http://www.internode.co.uk |
|-----------------------------------------------------------------|
| John Rumm - john(at)internode(dot)co(dot)uk |
\=================================================================/

Re: USB security keys

<urkphn$37vjg$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125661&group=uk.d-i-y#125661

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 08:53:58 -0500
Organization: A noiseless patient Spider
Lines: 56
Message-ID: <urkphn$37vjg$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me>
<urk5b6$338tv$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 27 Feb 2024 13:53:59 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d14d9b680dda1885d364f8b9d01b1aea";
logging-data="3407472"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19k54mKlXeAQcvkl/8sF8Uo5aFnKbinsx4="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:TMtYe5YfsSojlYOjr5BIH9cuF9I=
Content-Language: en-US
In-Reply-To: <urk5b6$338tv$1@dont-email.me>
 by: Paul - Tue, 27 Feb 2024 13:53 UTC

On 2/27/2024 3:09 AM, Handsome Jack wrote:
> John Rumm <see.my.signature@nowhere.null> wrote:
>> On 26/02/2024 22:24, David Paste wrote:
>>> Anyone got anything good or bad to say about them?
>>>
>>> Do they work with linux as well as Windows?
>>>
>>> I don't have a clue about them, but a youtube channel I watch has been
>>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>>> might be time for a security key, hense my question here.
>>
>>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>>
>> The main problem with 2FA on sites like youtube is that it is not really
>> being used that well. It is setup for convenience and ease of use rather
>> than strong securty.
>>
>> The 2FA is used to establish a session, but that session is then made
>> semi permanent by use of session cookies. So once the platform has
>> passed the 2FA, it is then in effect left logged in for an extended
>> periods of time. Most of the compromises seem to be based on stealing
>> those session cookies, and then transplanting them to the attackers
>> system. Low and behold, their browser is then automatically logged into
>> the account with no need for further 2FA checks.
>>
>> 2FA ought to be required for every login, with a inactivity timeout that
>> logs out of the account if not used for 30 mins etc.
>>
>> It is also not a good idea to use the machine that is used for
>> interacting with the account, uploading etc, for non related tasks like
>> admin and email. If you only have one machine, do all the admin stuff
>> inside a virtual machine, that is never used to access the account. That
>> way even if it is compromised, there are no sessions to hijack.
>
>
> Or set the browser to clear cookies each time it is closed?
>

You have to clean out DOM storage as well (search for +++ and branded items) .
And webappsstore.sqlite is also abused on a browser (some web sites pound
on that, so that must be part of advertising). That's for Firefox. Chrome
may well have details like this, but Chrome is very careful to spray
shit all over the place (for the obvious reasons).

I don't use this, but I consider the scripts in here to be a good source of
information regarding cleaning. I read these, rather than execute them.

https://www.bleachbit.org/download/file/t?file=BleachBit-4.6.0-portable.zip # Windows

https://www.bleachbit.org/download/file/t?file=bleachbit_4.6.0-0_all_ubuntu2310.deb # Linux

When webappsstore.sqlite is above 10MB in size, that causes a pretty
obvious performance problem with Firefox (higher latency, move slider nothing
happens). That's why it gets a hair cut here, every one to two days.

Paul

Re: USB security keys

<25urti504nme347c6747tre143hf6jtp73@4ax.com>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125662&group=uk.d-i-y#125662

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: peter@parksidewood.nospam (Peter Johnson)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 15:05:32 +0000
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <25urti504nme347c6747tre143hf6jtp73@4ax.com>
References: <urj338$2opn1$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Info: dont-email.me; posting-host="1d8b093a08f7f2b79782016dd45da735";
logging-data="3438376"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/E8gGjFfQFY/gqwHTk4IU6YjzF8tzOriQ="
User-Agent: ForteAgent/8.00.32.1272
Cancel-Lock: sha1:Is+rSYGdgqaL4zVdjoriRM3v/fg=
 by: Peter Johnson - Tue, 27 Feb 2024 15:05 UTC

On Mon, 26 Feb 2024 22:24:41 -0000 (UTC), David Paste
<pastedavid@gmail.invalid> wrote:

>Anyone got anything good or bad to say about them?
>
>
I looked into them a few weeks ago but couldn't work out whether there
would be any benefit for me in having one in my situation, using a PC
mostly and a phone sometimes.
So I bought one of these, https://www.amazon.co.uk/dp/B07VK71TST, a
fingerprint reader that works with Windows Hello (don't know about
Unix) to avoid the niggle of entering the password on the rare
occasions that Windows is restarted. I leave it plugged into to one of
the USB ports of the top of the PC case so it's convenient to use.

Re: USB security keys

<l46cs1Fida2U2@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125665&group=uk.d-i-y#125665

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: junk@admac.myzen.co.uk (alan_m)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 15:19:29 +0000
Organization: At Home
Lines: 28
Message-ID: <l46cs1Fida2U2@mid.individual.net>
References: <urj338$2opn1$1@dont-email.me>
<25urti504nme347c6747tre143hf6jtp73@4ax.com>
Reply-To: news@admac.myzen.co.uk
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net pM25AV8vPEVdxQMhNs+mpgEGWm4615GzloypsDrcKJhCWzxH39
Cancel-Lock: sha1:tArJVlHCt6SDeQ/uldXQ7D2TlHM= sha256:rGqKavSpSF5DIuJR7KJLknf9mytEfMaS5wZhaX8I7aE=
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <25urti504nme347c6747tre143hf6jtp73@4ax.com>
 by: alan_m - Tue, 27 Feb 2024 15:19 UTC

On 27/02/2024 15:05, Peter Johnson wrote:
> On Mon, 26 Feb 2024 22:24:41 -0000 (UTC), David Paste
> <pastedavid@gmail.invalid> wrote:
>
>> Anyone got anything good or bad to say about them?
>>
>>
> I looked into them a few weeks ago but couldn't work out whether there
> would be any benefit for me in having one in my situation, using a PC
> mostly and a phone sometimes.
> So I bought one of these, https://www.amazon.co.uk/dp/B07VK71TST, a
> fingerprint reader that works with Windows Hello (don't know about
> Unix) to avoid the niggle of entering the password on the rare
> occasions that Windows is restarted. I leave it plugged into to one of
> the USB ports of the top of the PC case so it's convenient to use.

Just make sure that you have a backup for when your fingerprint is not
recognised.

I find that when doing some forms of DIY such as plastering, handling
sandpaper etc. neither of my devices that have fingerprint readers will
recognise my finger(s). Also when my hands have been immersed in water
for some time or perhaps handling bleach I get the same problem.

--
mailto : news {at} admac {dot} myzen {dot} co {dot} ukaa

Re: USB security keys

<url5dd$3aaie$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125668&group=uk.d-i-y#125668

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jack@handsome.com (Handsome Jack)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 17:16:31 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <url5dd$3aaie$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me> <urk5b6$338tv$1@dont-email.me> <urkasn$34lpp$2@dont-email.me>
Injection-Date: Tue, 27 Feb 2024 17:16:31 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="38c2a4d76ce30bffac0223ad74c5ecf7";
logging-data="3484238"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+OZ030kdHPTKiHtxq8Zec9OEhHjjg7a30="
User-Agent: tin/2.6.2-20220130 ("Convalmore") (Linux/5.15.0-94-generic (x86_64))
Cancel-Lock: sha1:OAbGXqmVE1LLFEOHdMalJ+FkvKQ=
 by: Handsome Jack - Tue, 27 Feb 2024 17:16 UTC

John Rumm <see.my.signature@nowhere.null> wrote:
> On 27/02/2024 08:09, Handsome Jack wrote:
>> John Rumm <see.my.signature@nowhere.null> wrote:
>>> On 26/02/2024 22:24, David Paste wrote:
>>>> Anyone got anything good or bad to say about them?
>>>>
>>>> Do they work with linux as well as Windows?
>>>>
>>>> I don't have a clue about them, but a youtube channel I watch has been
>>>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>>>> might be time for a security key, hense my question here.
>>>
>>>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>>>
>>> The main problem with 2FA on sites like youtube is that it is not really
>>> being used that well. It is setup for convenience and ease of use rather
>>> than strong securty.
>>>
>>> The 2FA is used to establish a session, but that session is then made
>>> semi permanent by use of session cookies. So once the platform has
>>> passed the 2FA, it is then in effect left logged in for an extended
>>> periods of time. Most of the compromises seem to be based on stealing
>>> those session cookies, and then transplanting them to the attackers
>>> system. Low and behold, their browser is then automatically logged into
>>> the account with no need for further 2FA checks.
>>>
>>> 2FA ought to be required for every login, with a inactivity timeout that
>>> logs out of the account if not used for 30 mins etc.
>>>
>>> It is also not a good idea to use the machine that is used for
>>> interacting with the account, uploading etc, for non related tasks like
>>> admin and email. If you only have one machine, do all the admin stuff
>>> inside a virtual machine, that is never used to access the account. That
>>> way even if it is compromised, there are no sessions to hijack.
>>
>>
>> Or set the browser to clear cookies each time it is closed?
>
> Do you make sure you close all browser windows every time you access
> email? Do you make sure that your machine does a secure erase of the
> cookie storage every time as well?
>

Not the latter, certainly. Can these "compromises based on stealing session cookies
and then transplanting them to the attackers system" retrieve cookies deleted
by the browser? Seems a bit of a stretch, though I have no idea exactly
how browsers delete cookies.

Re: USB security keys

<url5v0$3anqt$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125669&group=uk.d-i-y#125669

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: see.my.signature@nowhere.null (John Rumm)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Tue, 27 Feb 2024 17:25:52 +0000
Organization: Internode Ltd
Lines: 63
Message-ID: <url5v0$3anqt$1@dont-email.me>
References: <urj338$2opn1$1@dont-email.me> <urjh8b$2s3u6$1@dont-email.me>
<urk5b6$338tv$1@dont-email.me> <urkasn$34lpp$2@dont-email.me>
<url5dd$3aaie$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 27 Feb 2024 17:25:52 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="81bfde61987b4623eb68b7dec5eba60d";
logging-data="3497821"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18Tyqh/SUKW/74SDlrH6JVpMER4kXNUqw4="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:mtDOOxRoyaDTw8u8/oc+YqD+jKI=
Content-Language: en-GB
In-Reply-To: <url5dd$3aaie$1@dont-email.me>
 by: John Rumm - Tue, 27 Feb 2024 17:25 UTC

On 27/02/2024 17:16, Handsome Jack wrote:
> John Rumm <see.my.signature@nowhere.null> wrote:
>> On 27/02/2024 08:09, Handsome Jack wrote:
>>> John Rumm <see.my.signature@nowhere.null> wrote:
>>>> On 26/02/2024 22:24, David Paste wrote:
>>>>> Anyone got anything good or bad to say about them?
>>>>>
>>>>> Do they work with linux as well as Windows?
>>>>>
>>>>> I don't have a clue about them, but a youtube channel I watch has been
>>>>> hacked twice in a month despite 2FA and all that jazz. He mentioned it
>>>>> might be time for a security key, hense my question here.
>>>>
>>>>> Also, if 2FA hasn't stopped a hacking attempt, what use is it?!
>>>>
>>>> The main problem with 2FA on sites like youtube is that it is not really
>>>> being used that well. It is setup for convenience and ease of use rather
>>>> than strong securty.
>>>>
>>>> The 2FA is used to establish a session, but that session is then made
>>>> semi permanent by use of session cookies. So once the platform has
>>>> passed the 2FA, it is then in effect left logged in for an extended
>>>> periods of time. Most of the compromises seem to be based on stealing
>>>> those session cookies, and then transplanting them to the attackers
>>>> system. Low and behold, their browser is then automatically logged into
>>>> the account with no need for further 2FA checks.
>>>>
>>>> 2FA ought to be required for every login, with a inactivity timeout that
>>>> logs out of the account if not used for 30 mins etc.
>>>>
>>>> It is also not a good idea to use the machine that is used for
>>>> interacting with the account, uploading etc, for non related tasks like
>>>> admin and email. If you only have one machine, do all the admin stuff
>>>> inside a virtual machine, that is never used to access the account. That
>>>> way even if it is compromised, there are no sessions to hijack.
>>>
>>>
>>> Or set the browser to clear cookies each time it is closed?
>>
>> Do you make sure you close all browser windows every time you access
>> email? Do you make sure that your machine does a secure erase of the
>> cookie storage every time as well?
>>
>
> Not the latter, certainly. Can these "compromises based on stealing session cookies
> and then transplanting them to the attackers system" retrieve cookies deleted
> by the browser? Seems a bit of a stretch, though I have no idea exactly
> how browsers delete cookies.

You can "undelete" deleted files, so generally yes.

--
Cheers,

John.

/=================================================================\
| Internode Ltd - http://www.internode.co.uk |
|-----------------------------------------------------------------|
| John Rumm - john(at)internode(dot)co(dot)uk |
\=================================================================/

Re: USB security keys

<jdnutihdqjv30sm3609s7paq4jakgd973r@4ax.com>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=125710&group=uk.d-i-y#125710

  copy link   Newsgroups: uk.d-i-y
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: peter@parksidewood.nospam (Peter Johnson)
Newsgroups: uk.d-i-y
Subject: Re: USB security keys
Date: Wed, 28 Feb 2024 16:25:40 +0000
Organization: A noiseless patient Spider
Lines: 26
Message-ID: <jdnutihdqjv30sm3609s7paq4jakgd973r@4ax.com>
References: <urj338$2opn1$1@dont-email.me> <25urti504nme347c6747tre143hf6jtp73@4ax.com> <l46cs1Fida2U2@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Info: dont-email.me; posting-host="94439e8fe66c3d9fa6211583eae6b9be";
logging-data="4175256"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19ROboFeg5pZTPsKv0oXJYCYw0dPBdMipI="
User-Agent: ForteAgent/8.00.32.1272
Cancel-Lock: sha1:02X1e+4XoNPDetQVGKDQizjZUqM=
 by: Peter Johnson - Wed, 28 Feb 2024 16:25 UTC

On Tue, 27 Feb 2024 15:19:29 +0000, alan_m <junk@admac.myzen.co.uk>
wrote:

>> I looked into them a few weeks ago but couldn't work out whether there
>> would be any benefit for me in having one in my situation, using a PC
>> mostly and a phone sometimes.
>> So I bought one of these, https://www.amazon.co.uk/dp/B07VK71TST, a
>> fingerprint reader that works with Windows Hello (don't know about
>> Unix) to avoid the niggle of entering the password on the rare
>> occasions that Windows is restarted. I leave it plugged into to one of
>> the USB ports of the top of the PC case so it's convenient to use.
>
>
>Just make sure that you have a backup for when your fingerprint is not
>recognised.
>
>I find that when doing some forms of DIY such as plastering, handling
>sandpaper etc. neither of my devices that have fingerprint readers will
>recognise my finger(s). Also when my hands have been immersed in water
>for some time or perhaps handling bleach I get the same problem.

Yes, I've come across that with the phone.
With the PC it defaults to wanting a password, and the fingerprint
reader has to chosen. I haven't worked out how to make the reader the
default, if it is possible.

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor