<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>i3m Blog &#187; password</title>
	<atom:link href="http://internal3m.com/CMS/Wordpress/tag/password/feed/" rel="self" type="application/rss+xml" />
	<link>http://internal3m.com/CMS/Wordpress</link>
	<description></description>
	<lastBuildDate>Thu, 21 Apr 2016 14:54:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>How I cracked my neighbor’s WiFi password without breaking a sweat</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/08/29/how-i-cracked-my-neighbors-wifi-password-without-breaking-a-sweat/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/08/29/how-i-cracked-my-neighbors-wifi-password-without-breaking-a-sweat/#comments</comments>
		<pubDate>Wed, 29 Aug 2012 14:37:56 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Tech News]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[wifi]]></category>
		<category><![CDATA[wpa]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1318</guid>
		<description><![CDATA[Last week&#8217;s feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure Web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose control of the wrong password and it may <a href='http://internal3m.com/CMS/Wordpress/2012/08/29/how-i-cracked-my-neighbors-wifi-password-without-breaking-a-sweat/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>Last week&#8217;s feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure Web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose control of the wrong password and it may only be a matter of time until the rest of our digital assets fall, too.</p>
<p>Take, for example, the hundreds of millions of WiFi networks in use all over the world. If they&#8217;re like the ones within range of my office, most of them are protected by the WiFi Protected Access or WiFi Protected Access 2 security protocols. In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. What I found wasn&#8217;t encouraging.</p>
<p>First, the good news. WPA and WPA2 use an extremely robust password-storage regimen that significantly slows the speed of automated cracking programs. By using the PBKDF2 key derivation function along with 4,096 iterations of SHA1 cryptographic hashing algorithm, attacks that took minutes to run against the recent LinkedIn and eHarmony password dumps of June would require days or even weeks or months to complete against the WiFi encryption scheme.</p>
<p>What&#8217;s more, WPA and WPA2 passwords require a minimum of eight characters, eliminating the possibility that users will pick shorter passphrases that could be brute forced in more manageable timeframes. WPA and WPA2 also use a network&#8217;s SSID as salt, ensuring that hackers can&#8217;t effectively use precomputed tables to crack the code.</p>
<p>That&#8217;s not to say wireless password cracks can&#8217;t be accomplished with ease, as I learned firsthand.</p>
<p><strong>MORE: </strong> <a href="http://arstechnica.com/security/2012/08/wireless-password-easily-cracked/" target="_blank">How I cracked my neighbor’s WiFi password without breaking a sweat | Ars Technica</a>.</p>
<p>&nbsp;</p>
<hr />
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/08/29/how-i-cracked-my-neighbors-wifi-password-without-breaking-a-sweat/feed/</wfw:commentRss>
		<slash:comments>475</slash:comments>
		</item>
		<item>
		<title>Developer Quits OAuth 2.0 Spec, Calls It &#8216;a Bad Protocol&#8217;</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/#comments</comments>
		<pubDate>Fri, 03 Aug 2012 13:40:27 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[interface]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[oauth]]></category>
		<category><![CDATA[password]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1234</guid>
		<description><![CDATA[OAuth 2.0 is a rewrite of the original OAuth spec, which offers a secure way to sidestep the dilemma of having to hand over passwords to third party sites and apps to access user data. Google, Facebook, Twitter, and Yahoo are among the high-profile sites that have embraced OAuth in some fashion. Unfortunately, according to <a href='http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>OAuth 2.0 is a rewrite of the original OAuth spec, which offers a secure way to sidestep the dilemma of having to hand over passwords to third party sites and apps to access user data. Google, Facebook, Twitter, and Yahoo are among the high-profile sites that have embraced OAuth in some fashion.</p>
<p>Unfortunately, according to Hammer those same big names are at least partly responsible for making OAuth 2.0 the fiendishly complex and convoluted spec that it has become. Hammer is not the first to question the usefulness of OAuth 2.0. In fact, we’ve previously argued that OAuth 2.0′s complexity is hurting the spirit of API experimentation on the web.</p>
<p>Hammer isn’t just questioning OAuth 2.0, he’s abandoned it entirely and completely erased himself from the project, calling it “a bad protocol… bad enough that I no longer want to be associated with it.”</p>
<p>In Hammer’s view OAuth 2.0 is “more complex, less interoperable, less useful, more incomplete, and most importantly, less secure” than its 1.0 cousin.</p>
<p><strong>MORE: </strong> <a href="http://www.webmonkey.com/2012/07/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/" target="_blank">Developer Quits OAuth 2.0 Spec, Calls It &#8216;a Bad Protocol&#8217; | Webmonkey | Wired.com</a>.</p>
<p>&nbsp;</p>
<hr />
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/feed/</wfw:commentRss>
		<slash:comments>304</slash:comments>
		</item>
	</channel>
</rss>
