Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suggesting updates for Chapter02-Overview-LoggingIn-and-Authentication.md #115

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

martinshelton
Copy link
Contributor

  • Removed "this is a living document" sentence and suggestion for NICAR18 documents, which do not appear to have been updated since 2018
  • Fixed broken "resource roundup" link
  • Removed "authorization" definition (this term does not appear again and may not add much, but no strong feelings about this!)
  • Removed paragraph about obfuscation with Gmail addresses (It's a great tip, but not sure if this really helps with obfuscation. No strong feelings!)
  • Removed LastPass as a recommendation in favor of 1Password, in light of LastPass's problematic new parent company: https://twitter.com/tenacioustek/status/1362049591068291076
  • Replace old 2FA-related links
  • Added some photos to the 2FA section and replaced the photo in the HTTPS section
  • Replaced some password manager links
  • Replaced links and wordsmithed the biometric unlock section
  • Removed ProtonMail suggestion for persistent email safety (this won't provide any added privacy, except for emails between ProtonMail users, so it might not be appropriate for the threat model outlined here, but we should probably plug it elsewhere in secure comms sections)
  • Clarified a bit about the difference between HTTP and HTTPS, and that HTTPS is now standard, and not necessarily a sign of safety
  • Consolidated two sections on temporary email into one
  • Edits for clarity throughout

- Removed "this is a living document" sentence and suggestion for NICAR18 documents, which do not appear to have been updated since 2018
- Fixed broken "resource roundup" link
- Removed "authorization" definition (this term does not appear again and may not add much, but no strong feelings about this!)
- Removed paragraph about obfuscation with Gmail addresses (It's a great tip, but not sure if this really helps with obfuscation. No strong feelings!)
- Removed LastPass as a recommendation in favor of 1Password, in light of LastPass's problematic new parent company: https://twitter.com/tenacioustek/status/1362049591068291076
- Replace old 2FA-related links
- Added some photos to the 2FA section and replaced the photo in the HTTPS section
- Replaced some password manager links
- Replaced links and wordsmithed the biometric unlock section
- Removed ProtonMail suggestion for persistent email safety (this won't provide any added privacy, except for emails between ProtonMail users, so it might not be appropriate for the threat model outlined here, but we should probably plug it elsewhere in secure comms sections)
- Clarified a bit about the difference between HTTP and HTTPS, and that HTTPS is now standard, and not necessarily a sign of safety
- Consolidated two sections on temporary email into one
- Edits for clarity throughout
Copy link
Collaborator

@zenmonkeykstop zenmonkeykstop left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Couple of changes requested, but I defer to you on the authorization and biometrics ones if you don't agree.

@@ -1,10 +1,8 @@
# Security in the Newsroom: Who are you?

This is a living document and the most recent version can be found at: <https://goo.gl/7ojKpw>. This lesson plan, which covers Passwords and Two Factor Authentication is a great hour long brown-bag session that was shared with us by Alan Palazzolo at the Minneapolis Star Tribune. For other great overview lesson plans, take a look at:
This lesson plan, which covers Passwords and Two Factor Authentication is a great hour long brown-bag session that was shared with us by Alan Palazzolo at the Minneapolis Star Tribune. For other great overview lesson plans, take a look at:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's nothing linked or reference after "..take a look at:"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Going to go ahead and drop that line, not sure what it refers to.

- Even if you don’t think you are at risk, we are all avenues to other people who may be targets. [*You are worthy of a data breach*](https://medium.com/@mshelton/journalists-you-are-worthy-of-a-data-breach-55f8e53fd3fe).

## Some terminology

Just to make sure we are all on the same page, here are some top-level words and concepts:

- **Authentication**: A mechanism used to identify someone. The most common mechanism is a username and password, but there are others, such as PIN codes, fingerprints, and more.
- **Authorization**: The ability to access a particular resource. For instance, your user on your computer has access to edit certain files, but not core, system files.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's not explicitly used in existing lesson plans but it could be in future ones, and it is a key concept. I'd vote for keeping it.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No problem, adding that back in!

@@ -49,9 +45,9 @@ It is very possible that you have had an account compromised. The site “[*Have

**Your identity**. If someone has access to your account, they can do things as you, such as post things to Twitter, reset accounts, or access sensitive information.

The Twitter account of CNN’s host, Anderson Cooper, was [*compromised*](http://thehill.com/homenews/media/364646-anderson-cooper-says-twitter-account-hacked-after-tweet-calling-trump-a) just as recently as December. Deray Mckesson ([*@deray*](https://www.wired.com/2016/06/deray-twitter-hack-2-factor-isnt-enough/)), a prominent figure in the Black Lives Matter organization and movement, had his account hacked into, even with second-factor authentication enabled. This is a good instance where one thought a security practice was solid, but in reality, it had holes.
In 2017, the Twitter account of CNN’s host, Anderson Cooper claimed his account was was [*compromised*](http://thehill.com/homenews/media/364646-anderson-cooper-says-twitter-account-hacked-after-tweet-calling-trump-a). And even with two-factor authentication enabled, Deray McKesson ([*@deray*](https://www.wired.com/2016/06/deray-twitter-hack-2-factor-isnt-enough/)), a prominent figure in the Black Lives Matter movement, had his account breached. The lesson: High-profile individuals are disproportionately targeted, and must take extra steps to lock down their account tightly.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: "was was"

@@ -66,23 +62,25 @@ Most of us have hundreds of services that require a username and password. Most

There are two popular password manager products that you should consider using: LastPass and 1Password. Both have similar features, but **LastPass** has a free tier with all the main features, and it can be used/installed without installing an application on your computer, so it is suggested for most users.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this still true given shenanigans?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree, good catch. Nixing LastPass here.


## Biometric authentication

Often used in place of a password, biometric authentication is using something that is unique to your physical body to prove that you are you. The most common is fingerprint scanning on our phones, as well as the face recognition that Apple has recently introduced.

Biometric authentication has its pros and cons (need reference). If you want to use biometric authentication, it is suggested to enhance it with a password or PIN; for instance, on Android, you can require the password every few days. If you are at a higher risk than most, such as working on very sensitive materials, use both a password and biometrics every time.

The use of biometric authentication is not new, but its consumer use is relatively new, and it really isn’t known what the [*practical*](https://views-voices.oxfam.org.uk/aid/2017/11/biometrics-help-us-answer-question) or [*legal*](https://www.popsci.com/iphonex-facial-recognition-legal-unlock) consequences of it are.
The use of biometric authentication is not new, but its consumer use is relatively new, we are still learning about the [*practical*](https://techcrunch.com/2021/07/26/court-orders-us-capitol-rioter-to-unlock-his-laptop-with-his-face/) and [*legal*](http://www.pennstatelawreview.org/print-issues/face-it-the-convenience-of-a-biometric-password-may-mean-forfeiting-your-fifth-amendment-rights/) implications of biometric device unlock software. In general, in risky situations where there is a reasonable chance your device might be seized (e.g., when visiting a border or protest) it may be best to disable biometrics.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can make a stronger recommendation here - face/fingerprint unlocking should be disabled in situations where arrest/search and seizure are more likely.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tried to strengthen the recommendation here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants