Sign In

Why do we still use passwords?

Using pass­words to access our online lives is a com­mon­place expe­ri­ence and so are the atten­dant frus­tra­tions. Cyber­se­cu­ri­ty demands ever­more com­pli­cat­ed for­mu­las: pass­words might nec­es­sar­i­ly be of a min­i­mum length, use a cap­i­tal, num­ber or spe­cial char­ac­ter. There is the reg­u­lar insis­tence that a pass­word be updat­ed and not just to one slight­ly dif­fer­ent or back to one you’ve used before.

“The good thing about pass­words is they’re easy to use and, if com­pro­mised, easy to replace,” explains Mari­am Nouh, researcher in cyber­se­cu­ri­ty at the Uni­ver­si­ty of Oxford. “There are no com­pat­i­bil­i­ty issues. You don’t need extra hard­ware. And busi­ness likes them because their use can be imple­ment­ed cost effec­tive­ly. The prob­lem though is they can be com­pro­mised in so many ways.”

Cer­tain­ly, while attempts at cyber­se­cu­ri­ty breach­es may be increas­ing­ly sophis­ti­cat­ed, the fact is pass­words butt up against human psy­chol­o­gy or, more specif­i­cal­ly, mem­o­ry. There are only so many dis­crete pass­words an indi­vid­ual can retain with­out the secu­ri­ty no-no of writ­ing them down, which is one rea­son for the rise of pass­word vault soft­ware.

The result is, when pos­si­ble, the use of famil­iar, emo­tion­al­ly sig­nif­i­cant phras­es, which is to say util­is­ing the same mech­a­nisms behind how humans remem­ber a lot of things. But the famil­iar makes it eas­i­er for hack­ers to crack the pass­word.

Leaving personal data exposed

Accord­ing to a 2018 sur­vey by pass­word man­age­ment com­pa­ny Last­Pass and Lab42, 59 per cent of respon­dents use the same pass­word across mul­ti­ple accounts. A major­i­ty of peo­ple would only go through the both­er of updat­ing their pass­words if they were hacked; after all, they seem secure until that point. But then, accord­ing to a 2019 study by Ver­i­zon, 80 per cent of hack­ing-relat­ed secu­ri­ty breach­es are a result of weak or com­pro­mised cre­den­tials.

We’re going to use pass­words for some time because, from a secu­ri­ty point of view, the whole sys­tem out there is just so com­plex

When LinkedIn suf­fered a data breach in 2012 and some 117 mil­lion pass­words were com­pro­mised, many were revealed to be rather obvi­ous. Among those used hun­dreds of thou­sands of times were “123456”, “linkedin” and “pass­word”.

“There’s a lot of dis­so­nance between how we know we should use pass­words and how we actu­al­ly do,” says Rachael Stock­ton, senior direc­tor of prod­uct at Log­MeIn, mak­ers of Last­Pass. And it’s not just a mat­ter of mem­o­ry. “A lot of our cus­tomers are just after sim­plic­i­ty, less time-wast­ing and more pro­duc­tiv­i­ty. And we’re going to need more sim­plic­i­ty [in our pass­word man­age­ment] because the num­ber of accounts we each use on the inter­net is only going to increase,” she says.

Getting educated about data security

That most of us don’t make much effort with our pass­words isn’t just our fault. Arguably, secu­ri­ty soft­ware design has failed to take human psy­chol­o­gy into con­sid­er­a­tion.

“The indus­try has not done well in edu­cat­ing con­sumers how to use pass­words,” con­cedes Rolf Lin­de­mann, vice pres­i­dent of prod­uct at Nok Nok Labs, an authen­ti­ca­tion soft­ware ven­dor. “The result is this trade-off between secu­ri­ty and con­ve­nience. That’s the dilem­ma.”

And espe­cial­ly giv­en that the vast major­i­ty of web­sites still use pass­words. It’s esti­mat­ed there are now some 300 bil­lion active pass­words. Even Fer­nan­do Cor­ba­to, the man who pio­neered the use of the pass­word online, has described the sit­u­a­tion as a “kind of night­mare”.

There have been new kinds of pass­words pro­posed. Because peo­ple recog­nise pic­tures bet­ter than they remem­ber words, so-called graph­i­cal pass­words request users click cer­tain points on an image in a cer­tain order. The num­ber of pos­si­ble points essen­tial­ly makes each user’s sequence unguess­able. The effi­ca­cy of this approach is still being worked out.

But the likes of George Waller, co-founder of Strike­Force Tech­nolo­gies, a US start­up with a num­ber of patent­ed cyber­se­cu­ri­ty inven­tions under its belt, argues the prob­lem isn’t with pass­words per se. Although he points out that most online busi­ness­es typ­i­cal­ly want to offer con­sumers the path of least resis­tance to gain access to their sites. The prob­lem is with pass­words’ deliv­ery to servers down the line.

“Ulti­mate­ly, it’s not real­ly a mat­ter of whether we use pass­words or not, or whether or not you enforce stricter poli­cies on their use. It doesn’t mat­ter so much what you type in because there typ­i­cal­ly isn’t encryp­tion at the key-stroke lev­el and data is in tran­sit [and so vul­ner­a­ble] from the time you start typ­ing your pass­word,” he says. “We’re going to use pass­words for quite some time because, from a secu­ri­ty point of view, the whole sys­tem out there is just so com­plex.”

Most popular passwords

The future of the password

So does the pass­word have any future, espe­cial­ly giv­en the advent of the inter­net of things, which only looks like mak­ing cyber­se­cu­ri­ty breach­es more wide­spread? “Pass­words won’t go away com­plete­ly, but I think we have to expect more mul­ti-fac­tor authen­ti­ca­tion, though that still needs to be con­ve­nient to use, while offer­ing a sen­si­ble lev­el of secu­ri­ty to car­ry the pub­lic with it,” says Oxford’s Nouh.

This lay­ered secu­ri­ty approach is unlike­ly to come in the form of bio­met­rics, which are them­selves not com­plete­ly secure and, when stolen, irre­place­able, unlike a pass­word. Or at least not just bio­met­rics. What’s need­ed, Lin­der­mann con­tends, is how­ev­er secure sites are accessed, we’re tied to a device that can be used to iden­ti­fy us. And this is a device most of us already car­ry and increas­ing­ly use to access the inter­net any­way: our smart­phones.

We’re increas­ing­ly used to receiv­ing con­fir­ma­tion text mes­sages when work­ing through secu­ri­ty. But now such devices also oper­ate their own fin­ger­print or facial recog­ni­tion sys­tems. Fea­tures lim­it­ed to high-end, expen­sive phones just five years ago are increas­ing­ly com­mon­place and acces­si­bly priced.

Since Microsoft launched its Win­dows 10 oper­at­ing sys­tem last year, such pass­word-free authen­ti­ca­tion is start­ing to come to desk­tops too. Device geolo­ca­tion – if users are will­ing to share such infor­ma­tion – is poten­tial­ly anoth­er added lay­er of secu­ri­ty.

Indeed, in a sense this more effi­cient device-led pro­pos­al is akin to the way in which an ATM requires both PIN num­ber and the phys­i­cal bank card. Or the way in which Esto­nia, for exam­ple, has devel­oped its e‑Identity sys­tem, which pro­vides all cit­i­zens with a chip-and-pin e‑card designed to authen­ti­cate an individual’s dig­i­tal iden­ti­ty.

Making account access simple

Lin­der­mann says: “It’s a mat­ter of lever­ag­ing these devices in the right way and in a con­sis­tent way; one that allows users to chose the modal­i­ty – they can still use a PIN if they’re not com­fort­able with trust­ing their bio­met­rics [to a third par­ty] – but which ties their iden­ti­ty to the spe­cif­ic device, a capa­bil­i­ty that can be off-loaded to devices we don’t own on the rare occa­sions that’s need­ed. It works because peo­ple want a much eas­i­er engage­ment with busi­ness that have secured sites and the ease of use is bet­ter for busi­ness too.”

Andrew Shikiar agrees. He’s the exec­u­tive direc­tor of the FIDO Alliance, a con­sor­tium of tech secu­ri­ty com­pa­nies push­ing for the cre­ation of an indus­try stan­dard to address secu­ri­ty inter­op­er­abil­i­ty between devices and so far sup­port­ed by big guns the likes of Amer­i­can Express, Ama­zon and Google.

“Pass­words are the tip of the spear of the data-breach prob­lem,” says Shikiar. “But the fun­da­men­tal prob­lem is the [online secu­ri­ty] archi­tec­ture itself. Using devices would not only give a bet­ter user expe­ri­ence – peo­ple are already used to unlock­ing their phones using bio­met­rics – but it would get rid of scaleable cyber attacks. It would neces­si­tate a behav­iour­al change, but we have to break our depen­dence on pass­words.”

He’s bet­ting on that hap­pen­ing soon. He reck­ons the major­i­ty of main­stream con­sumer ser­vices online will have a pass­word-free means of access­ing them with­in five years.