<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; authentication</title>
	<atom:link href="https://javacard.vetilles.com/tag/authentication/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>SMS-based 2-factor: Good or Bad?</title>
		<link>https://javacard.vetilles.com/2016/06/30/sms-based-2-factor-good-or-bad/</link>
		<comments>https://javacard.vetilles.com/2016/06/30/sms-based-2-factor-good-or-bad/#comments</comments>
		<pubDate>Thu, 30 Jun 2016 20:04:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25887</guid>
		<description><![CDATA[Wired published recently an article about how SMS-based 2-factor authentication is not good. This article is making a buzz, and an article appeared on that topic in Fortune. The basis for these articles is that SMS-based authentication is not associated to something you have (your phone), but with something you are loosely associated to (your [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Wired published recently an article about how <a href="https://www.wired.com/2016/06/hey-stop-using-texts-two-factor-authentication/" class="liexternal">SMS-based 2-factor authentication is not good</a>. This article is making a buzz, and an article appeared on that topic <a href="http://fortune.com/2016/06/27/two-factor-authentication-sms-text/" class="liexternal">in Fortune</a>. The basis for these articles is that SMS-based authentication is not associated to something you have (your phone), but with something you are loosely associated to (your phone number).</p>
<p>The article demonstrates how easy it is to hijack&#8217;s someone&#8217;s phone number. And of course, once this is done, you can get the authentication SMS and get in. The article points to a solution that really makes your phone a second factor, such as the Google Authenticator application. It generates a one-time password every 30 seconds, without depending on any communication: you simply need to run the app.</p>
<p>But SMS-based second factor isn&#8217;t that bad, and it is definitely better than nothing, and Wired fails to tell us why:</p>
<ul>
<li>In the case of a big leak of a few million passwords, any second factor works to protect you against the robots who will check that the password is working before putting it for sale.</li>
<li>However, it doesn&#8217;t protect you well from that guy who is chasing <strong>YOU</strong>. In that case, the SMS is definitely easier to hack than other methods that require physical access.</li>
</ul>
<p>Unless you are famous or you are being unfriendly to hackers, it is quite unlikely that you will be targeted personally by a hacker (at least these days, this may change in a few years&#8230;).</p>
<p>So,if you are using SMS-based 2-factor authentication, you may think about other methods if they are available (<a href="https://fidoalliance.org/" class="liexternal">Fido</a> is great). But if you don&#8217;t use 2-factor authentication at all, please start by using this SMS thing, it will protect you at least against the major leaks that we are seeing these days.</p>
<p>Wondering which services you can protect with 2-factor authentication? Check <a href="https://www.linkedin.com/pulse/22-sites-where-you-should-enable-two-factor-right-now-brennen-cissp" class="liexternal">this page</a>  and realize that most of the sites you use can be protected.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2016/06/30/sms-based-2-factor-good-or-bad/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 2: NFC authentication in the cloud</title>
		<link>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/</link>
		<comments>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/#comments</comments>
		<pubDate>Thu, 20 Sep 2012 10:15:51 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/</guid>
		<description><![CDATA[This is a presentation from Gemalto&#8217;s Maurizio Divona, delivered by her colleague Virgine Galindo. It starts from cloud authentication, where strong authentication typically happens with tokens that need to be distributed by service providers. The idea is of course to use NFC technology to simplify this, which would allow the use of strong authentication in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is a presentation from Gemalto&#8217;s Maurizio Divona, delivered by her colleague Virgine Galindo. It starts from cloud authentication, where strong authentication typically happens with tokens that need to be distributed by service providers.</p>
<p>The idea is of course to use NFC technology to simplify this, which would allow the use of strong authentication in more situations. The idea is here to have credentials in mobile phone applications, and to use it in a NFC transaction with a PC. Here, the service provider delivers a user credential in the phone, or delegates this to a TSM. Because the credential will be stored in the secure element, it is possible to emulate all kinds of hardware tokens on the mobile phone, with a similar security level.</p>
<p>This is an interesting way to introduce new applications in the NFC secure element, especially ifhy can make our lives easier.  Of course, this assumes that there actually is an infrastructure ready for downloading content to it, and business models in place to actually get the credentials in an efficient way to the secure element. So, some way to go here.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 2: My personal attribute hub</title>
		<link>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/</link>
		<comments>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/#comments</comments>
		<pubDate>Thu, 20 Sep 2012 09:50:19 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[authentication]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/</guid>
		<description><![CDATA[This is a talk by Annette Laube, from the University of Bern. It builds on Switzerland&#8217;s eID program, extending it for new uses. The idea of national eIDs is to provide electronic signatures, and to certify personal attributes taken from official documents like a passport. The SuisseID used in Switzerland is a tradtional one, in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is a talk by Annette Laube, from the University of Bern. It builds on Switzerland&#8217;s eID program, extending it for new uses. The idea of national eIDs is to provide electronic signatures, and to certify personal attributes taken from official documents like a passport. The SuisseID used in Switzerland is a tradtional one, in which the attributes are restricted to data present on ID documents, built on a national certificate authority and associated claim assertion service. However, there is a possibility to add claim asserion services, envisioned as coming from other government entities or other official entities.</p>
<p>The motivation of myIDP is to reduce the amount of redundant data that we have to enter in various sites, especially related ot e-government, which is error-prone and leads to many validation problems. In the SuisseID, the idea is to add another claim assertion service. With myIDP, users can save data entered on e-forms that have been accepted by a service provider, for reuse in other circumstances. The idea behind it is that information that has already been accepted somewhere is more likely to be correct. Interestingly, the user has access to the recorded attributes, and can decide to remove some that she doesn&#8217;t want to be recorded.</p>
<p>MyIDP can function as an attribute provider or as a claim proxy . As an attribute provider, a service provider requests an attribute, MyIDP then asks the user to confirm the use of a recorded attribute, and signs it before to return it. As a claim proxy, the service provider request comes with a claim list request. MyIDP then returns the signed attribute together with a claim list URI, from which the service provider can download information about where the information has previously been accepted as valid, and use this information to decide how trustworthy the attribute is.</p>
<p>This project sounds really good, because once again, we are movng from hard identity to soft identity, where data is not 100% trusted but nevertheless more trusted than data entered manually. And of course, this model is very nice because, the more it is used, the more trustworthy it gets. The quality of attributes grows as they are getting used, and this is an important property.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 1: Mobile authentication</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 20:42:34 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[Moile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/</guid>
		<description><![CDATA[Presentation from Vasco&#8217;s Nicolas Fort. Of course, the use case is about banking, since this Vasco&#8217;s stronghold. Banks have been used to interface with customers face to face in branches. 40 years ago, they added the phone, first with a human on the bank&#8217;s end, then without. They then added the ATM network to check [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Presentation from Vasco&#8217;s Nicolas Fort. Of course, the use case is about banking, since this Vasco&#8217;s stronghold. Banks have been used to interface with customers face to face in branches. 40 years ago, they added the phone, first with a human on the bank&#8217;s end, then without. They then added the ATM network to check balance. And then came internet.</p>
<p>Internet banking has now taken over as the main interface with banks, with of course a shift to mobile devices in the recent years. In the end, banking is adapting quite fast to technology, because customers expect them to move fast (if they don&#8217;t, customers can switch).</p>
<p>So, the banking ecosystem has adapted to integrate new technologies, and they do that fast. Of course, at least according to Vasco, the problem is fraud, and the solution is authentication. Vasco&#8217;s answer includes platgorm evaluation (jailbroken or not?), user evaluation (2-factor authentication), transaction evaluation (2-factor authentication again) and finally validation.</p>
<p>The next idea is to use NFC to improve 2-factor authentication, for instance to provision keys, to perform WYSIWYS checks. On the opposite, 2-factor authentication can benefit to NFC, by providing flexible authentication.</p>
<p>That all sounds interesting, but I will need a bit more technical information to undrstand what they are saying. In particular, I am always careful with solutions in which one of the 2 factors needed for authentication isnthe device on which I want to do something. This may not be very rational, bit I am not feeling good about it.</p>
<p>Of course, this presentation was a lot about advertising, and yiu can better understand where Vasco is going to by getting to <a href="http://www.mydigipass.com" class="liexternal">MyDigipass</a>. This offer sounds interesting for securing online accounts. Maybe that I will consider giving it a try.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloud (mis)authentication</title>
		<link>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/</link>
		<comments>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 10:17:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cloud]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=814</guid>
		<description><![CDATA[I just read an amazing and chilling story about cloud authentication and hacking. Some guy just lost a big chunk of his digital life, because cloud authentication is not secure, or maybe even more, because cloud authentication is not enough standardized/regulated/watched. In his case (read the story, I won&#8217;t repeat it here, and it is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I just read <a href="http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/" class="liexternal">an amazing and chilling story</a> about cloud authentication and hacking. Some guy just lost a big chunk of his digital life, because cloud authentication is not secure, or maybe even more, because cloud authentication is not enough standardized/regulated/watched. In his case (read the story, I won&#8217;t repeat it here, and it is definitely worth it), the main flaw comes from the fact that Amazon identifies your credit cards on file by the 4 last digits, and Apple requires these very digits to authenticate an iCloud user.</p>
<p>What? No standard on the digits that may/may not be disclosed? I couldn&#8217;t get the facts from EMV or others (if you know, I am interested), but I noticed that although the digits printed on most of my (French) credit card receipts are the same (9 digits following the pattern xxxx xx00 0000 000x), some of my receipts include the infamous 4 last digits, and an Italian receipt includes the 8 first digits. Just with these few examples, I would say that, either there is no standard about which digits to show/hide, or the standard is not applied anyway. It is not difficult to guess that this is most likely not better on Internet, and not only at Amazon.</p>
<p>On this particular issue, I would blame Apple, because the information they require to grant access to an iCloud account is not sufficient (e-mail, billing address, partial credit card number). In particular, Apple allows you to forget the answers to your security questions, which doesn&#8217;t sound very good.</p>
<p>Mat Honan recommends in his paper to move beyond passwords and to adopt two-factor authentication. This sounds sensible, and I approve this move. However, in the present case, how useful would that be? If a cloud vendor uses two-factor authentication, then there must be a procedure for lost tokens. And this procedure better be good.</p>
<p>Not that it&#8217;s that complicated to design a procedure that works. We can for instance rely on existing infrastructure, like the Post Office. You can request your password to be snailmailed to you in a Certified Letter, which will require in-person delivery at your home or authentication with a government ID at the post office. This works perfectly against hackers, because they are not good at physical actions that require real presence.</p>
<p>However, this has some trade-offs: delay and price. Changing a password online is about free and instantaneous, whereas sending a physical letter has a cost, and it will take at least one day. I am ready to accept this delay and this cost to protect my most important cloud accounts, because I have some understanding of the risks. Not everybody does.</p>
<p>This actually represents an interesting role for two-factor authentication tokens: end-user education. Because they are a physical object, any user will understand that a new one needs to be sent if it is lost or compromised. And although they won&#8217;t be happy, they may/should/will associate the cost and delay associated to the token replacement to the security of their account.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
