Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

WiKID Strong Authentication Community Edition on the Amazon Cloud

We have created a public AMI version of the WiKID Strong Authentication System for Amazon's EC2 cloud offering.  While it is quite simple to install WiKID on a Redhat or Ubuntu linux AMI, we hope that this will make it even easier for people to learn about two-factor authentication.  

2-factor for Ubuntu just got easier

It's been busy around here.  Today we finally released our WiKID Strong Authentication server .debs for Ubuntu.  These packages have the same functionality as the RPMs, except that we don't currently have replication working (another story altogether).

More Marketing Service firms in the news

Dark Reading is reporting that Best Buy has suffered a second loss of customer data - e-mail addresses - through another vendor (not Epsilon).  

PCI news & updates

According to this article on InformationWeek:

RSA, Comodo and Barracuda. One of these is not like the others.

Consider this:

The RSA attack shows that SecurID has an architecture risk: They keep a copy of your shared secrets for revenue reasons. The Comodo attack shows a structural risk: incentives exist to sell certificates without investing it making sure they are legitimate. The RSA attack does not minimize the benefit of using two-factor authentication. It only highlights the well-known risk of using shared secrets instead of asymmetric encryption.  The Comodo attack doesn't mean that SSL encryption doesn't work. It just points out (again) that the CA trust model is broken. 

Both attacks also demonstrate that having a vendor in the middle increases the attack surface. This is the key take-away from these attacks. I'm concerned that this is getting lost and that companies will move to authentication systems that have the same risk. A prime example of such a system would be SMS-based authentication. If you can't trust RSA with your secrets, can you trust your mobile phone carrier?   

The Barracuda attack is different.  Ironically, the Barracuda attack shows the value of their own technology.  Yes, they may need to improve it (or turn it on), but fundamentally, their technology should have stopped the attack. To me this is a very important difference.

Recent Posts

Archive

2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom