HN Theater @HNTheaterMonth

The best talks and videos of Hacker News.

Hacker News Comments on
RVAsec 2012: Why Do You Lock Your Door? (Schuyler Towne)

RVAsec · Youtube · 17 HN points · 2 HN comments
HN Theater has aggregated all Hacker News stories and comments that mention RVAsec's video "RVAsec 2012: Why Do You Lock Your Door? (Schuyler Towne)".
Youtube Summary
Presentation Slides: http://rvasec.com/slides/2012/6_towne_why_do_you_lock_your_door_rvasec_2012.ppt

Two factor authentication, key space, security by obscurity, public and private keys; all of these things, and many other conventions of digital security, had their origin well before the birth of the computer. Today most security professionals think of locks as curiosities or puzzles, and are well acquainted with the idea that "locks keep honest people honest." However, physical security has a rich history and our modern relationship to locks is very different than it was even a hundred years ago. In this talk we'll explore the history of physical security, from the origins of the lock, to the locksmith King of Worms, to the great lock controversy of 1851 and beyond. Knowing how different times and cultures designed, attacked and lived with locks provides remarkable context to the modern history of digital security.

Schuyler Towne is obsessed with locks. While he got his start picking locks competitively, his interest has since exploded into every aspect of their history, design and manipulation. He's taught hackers, authors, cops and even toy designers. There is nothing Schuyler loves more than to talk locks with anyone who will listen. His interests in the history of physical security and design of locks provides a passionate background to his lectures and workshops on lockpicking. Currently he is writing an Almanac of Locksport for O'Reilly and studying media portrayals of lockpicking.
HN Theater Rankings

Hacker News Stories and Comments

All the comments and stories posted to Hacker News that reference this video.
Aug 20, 2022 · 3 points, 2 comments · submitted by Tomte
bediger4000
Most doors wouldn't really keep a serious attacker out, but a locked door does make it a bit harder to the prospective thief to enter.

But "security" is an economic good, with a cost and a value. Locking the door is a small cost. It has a much higher value, so I do it.

elmerfud
I lock my door to control access. Physical barriers aren't meant as a way to prevent access but as a way to control access. A locked door means that those without the required permission shouldn't pass. If they do pass you immediately know they are unauthorized and can treat them as such.

Locks also keep honest people honest. Sometimes temptation and curiosity are too much.

Jan 23, 2022 · 2 points, 1 comments · submitted by Tomte
bediger4000
Because "security" is an economic good, with a cost and a value. When the value is at least the cost, you do the security thing. Locking doors has almost zero cost, and much less than zero value most of the time, hence: lock your doors.
May 21, 2021 · 1 points, 0 comments · submitted by Tomte
Feb 12, 2020 · 1 points, 0 comments · submitted by Tomte
Aug 11, 2019 · 2 points, 0 comments · submitted by Tomte
nakashihagamuta
That's an interesting insight.
Feb 28, 2019 · 2 points, 0 comments · submitted by Tomte
Oct 08, 2018 · 1 points, 0 comments · submitted by Tomte
Apr 03, 2018 · 1 points, 0 comments · submitted by Tomte
Oct 28, 2017 · 2 points, 0 comments · submitted by Tomte
Jun 25, 2017 · 2 points, 0 comments · submitted by Tomte
> [Fingerprints] are just hard to reproduce.

I think this is the key point. If fingerprints were like public-key authentication mechanisms, they'd be fantastic. If it was mathematically impossible or even just very difficult to fake them just by intercepting previous authentications, that would be incredibly useful.

That's not the case though.

They're easily reproduced in moments using putty[0] or play-doh[1]. Or duplicated using household materials, even from a fingerprint collected from the targeted iOS device itself.[2] Some teams have found difficulty using some of these methods against a MS fingerprint scanner, but still found success using a toy wax kit from Crayola.[3]

But the general point about revocation is this: you should imagine, whenever designing a security system, "what's my fallback when this fails?" Biometrics can fail for lots of reasons, not only due to adversaries.[4] You need to have some idea of how to recover from those failures beyond just insisting that those failures don't happen or are unlikely.

Revocation is a handy fallback in those situations for a lot of systems. It's so common that people probably wrongfully assume it's the only way to recover. Fingerprints can't offer revocation, but they may have other fallbacks. Maybe you have a guard checking photo IDs if a scanner doesn't work for entry to a facility.

Scanners for devices might need to simply fail to require usernames and passwords for some users after they've been compromised. That could still offer convenience for other users, but over time, fewer and fewer users would get that benefit.

Or maybe fingerprints are just not designed to be that secure, and maybe that's ok. Anyone can get through the standard household locks in seconds with about 30 minutes max of research on youtube. They're not perfect security and not intended to be, they just put a small barrier (mostly social) to prevent the most nuisance level entries.[5]

[0] http://www.puttyworld.com/thinputdeffi.html

[1] https://secure.marketwatch.com/story/this-company-hacked-an-...

[2] http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren.en

[3] http://www2.washjeff.edu/users/ahollandminkley/Biometric/ind...

[4] See Yager and Dunstone on the Biometric Menagerie for an interesting classification system for the wide variety of failure cases you have to tune any biometric system against.

[5] If you want more about this philosophy / interpretation of locks and security, or even if you don't, there are fewer better ways to spend an hour than by listening to the brilliant Schuyler Towne at RVAsec on the history and social function of locks and lock-making. No seriously, it's amazing. https://www.youtube.com/watch?v=3nROJz_UNQY

EDIT: moderated my views in the last two paras, sorry for any whiplash.

dpark
So there are two things I would like to address. First, fingerprints do not need to be cryptographically secure to be sufficient for a great many purposes. As you noted, a house lock can be picked in seconds by someone with moderate skill and yet they are sufficient for physical security on most cases.

Second, and more important, we need to stop pretending that passwords actually work well when we have these sorts of conversations. The reality is that most people reuse the same passwords everywhere and when they are forced to use secure/unique passwords they cope by doing things like writing them down on sticky notes attached to their monitors. The reality is that most people are probably using a compromised password for their bank access because they used the same password on a dozen sites that have been compromised. When we compare fingerprint security to passwords, we need to stop comparing it to the mythical unique passphrase because essentially no one is using that.

I'll also point out that copying someone's fingerprint when they cooperate by taking a clay mold is quite different from lifting a fingerprint off, e.g., a glass. But nonetheless, I do not dispute that it is quite feasible to clone fingerprints.

May 14, 2015 · ejcx on Perfect Security
This article mentions Schuyler Towne at the end.

I've watched Schuyler talk[0][1] at RVASec (a small richmond va security conference) the last couple years.

If you find locks even almost remotely interesting, Schuyler is the guy who will talk until you think they are really interesting. He's super passionate about locks and gives a ton of easily digestable information about them.

[0] - https://www.youtube.com/watch?v=3nROJz_UNQY

[1] - https://www.youtube.com/watch?v=kTQWPrl_Tao

fabulist
I concur that Towne is a great speaker on this subject, and would like to add that he's an HN user.

https://news.ycombinator.com/user?id=emhart

I discovered this by reading this comment, and as soon as I read "security anthropologist", I figured there couldn't be two of those.

https://news.ycombinator.com/item?id=8156030

HN Theater is an independent project and is not operated by Y Combinator or any of the video hosting platforms linked to on this site.
~ yaj@
;laksdfhjdhksalkfj more things
yahnd.com ~ Privacy Policy ~
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.