Thursday, May 26, 2022

A Big Bet to Kill the Password for Good

After a decade of work, the FIDO Alliance says it’s found the missing piece in the bridge to a password-free future.

AFTER YEARS OF tantalizing hints that a passwordless future is just around the corner, you're probably still not feeling any closer to that digital unshackling. Ten years into working on the issue, though, the FIDO Alliance, an industry association that specifically works on secure authentication, thinks it has finally identified the missing piece of the puzzle. 

On Thursday, the organization published a white paper that lays out FIDO's vision for solving the usability issues that have dogged passwordless features and, seemingly, kept them from achieving broad adoption. FIDO's members collaborated to produce the paper, and they span chipmakers like Intel and Qualcomm, prominent platform developers like Amazon and Meta, financial institutions like American Express and Bank of America, and the developers of all major operating systems—Google, Microsoft, and Apple. 

The paper is conceptual, not technical, but after years of investment to integrate what are known as the FIDO2 and WebAuthn passwordless standards into Windows, Android, iOS, and more, everything is now riding on the success of this next step.

“The key to being successful for FIDO is being readily available—we need to be as ubiquitous as passwords,” says Andrew Shikiar, executive director of the FIDO Alliance. “Passwords are part of the DNA of the web itself, and we’re trying supplant that. Not using a password should be easier than using a password.”

In practice, though, even the most seamless passwordless schemes are not quite there. Part of the challenge simply lies with the enormous inertia passwords have built up. Passwords are difficult to use and manage, which drives people to take shortcuts like reusing them across accounts and creates security issues at every turn. Ultimately, though, they’re the devil you know. Educating consumers about passwordless alternatives and getting them comfortable with the change has proven difficult.

Beyond just acclimating people, though, FIDO is looking to get to the heart of what still makes passwordless schemes tough to navigate. And the group has concluded that it all comes down to the procedure for switching or adding devices. If the process for setting up a new phone, say, is too complicated, and there’s no simple way to log into all of your apps and accounts—or if you have to fall back to passwords to reestablish your ownership of those accounts—then most users will conclude that it’s too much of a hassle to change the status quo.

“Not using a password should be easier than using a password.”

The passwordless FIDO standard already relies on a device’s biometric scanners (or a master PIN you select) to authenticate you locally without any of your data traveling over the internet to a web server for validation. The main concept that FIDO believes will ultimately solve the new device issue is for operating systems to implement a “FIDO credential” manager, which is somewhat similar to a built-in password manager. Instead of literally storing passwords, this mechanism will store cryptographic keys that can sync between devices and are guarded by your device’s biometric or passcode lock. 

At Apple’s Worldwide Developer Conference last summer, the company announced its own version of what FIDO is describing, an iCloud feature known as “Passkeys in iCloud Keychain,” which Apple says is its “contribution to a post-password world.”

“Passkeys are WebAuthn credentials with the amazing security that the standard provides, combined with the usability of being backed up, synced, and working on all of your devices,” Garrett Davidson, an engineer for Apple’s app authentication experience team explained at the conference in June. “We’re storing them in iCloud Keychain. Just like everything else in your iCloud Keychain, they’re end-to-end encrypted, so not even Apple can read them … And they’re very easy to use. In most cases, it just takes a single tap or click to sign in.”

If you lost your old iPhone, for example, and you’re unboxing a new one, the transfer process can happen simply through whatever setup flow Apple offers at the time. If you lost your iPhone and decide to switch to Android, or are moving between any other two digital ecosystems, the process may not be quite as smooth. But FIDO’s white paper also includes another component, a proposed addition to its specification that would allow one of your existing devices, like your laptop, to act as a hardware token itself, similar to stand-alone Bluetooth authentication dongles, and provide physical authentication over Bluetooth. The idea is that this would still be virtually phish-proof since Bluetooth is a proximity-based protocol and can be a useful tool as needed in developing different versions of truly passwordless schemes that don’t have to retain a backup password.

Christiaan Brand, a product manager at Google who focuses on identity and security and collaborates on FIDO projects, says that the passkey-style plan follows logically from the smartphone or multi-device image of a passwordless future.

“This grand vision of ‘Let’s move beyond the password,’ we’ve always had this end state in mind to be honest, it just took until everyone had mobile phones in their pockets,” Brand says. Google joined FIDO just months after its formation in 2013. “Hopefully for the users it will be a small behavioral change, but the technology is a giant leap forward.”


To FIDO, the biggest priority is a paradigm shift in account security that will make phishing a thing of the past. Attackers have become masters at tricking users into unintentionally handing over their passwords, and even two-factor authentication codes or approval prompts can be exploited. Such scams facilitate criminal profit, but they have also played a role in espionage and destructive cyberattacks that have shaped geopolitics and global events.

Even if FIDO has finally found the magic formula, passwords won’t disappear overnight for a host of reasons. The most important is that not all people own a smartphone at all, much less multiple devices that can backstop each other if one is lost or stolen. And it will take years of turnover before everyone around the world has access to newer devices and operating system versions that support FIDO’s passwordless push. In the meantime, tech companies will need to maintain both passwordless and password-based login schemes. In its new white paper and elsewhere, FIDO is working to support this transition, but as with any other tech migration (ahem, Windows XP), the road will inevitably prove arduous.

Additionally, while FIDO’s proposal is a major security improvement over passwords in many ways, it isn’t infallible. Its success will depend on the security of each operating system’s implementation. You’re already likely all too familiar with the nightmare of being forced to trust the authentication scheme of each website and service you have an account with, but no alternative is perfect. FIDO’s vision will simply create a different, if potentially better and more sensible, set of weaknesses and points of failure. As FIDO itself notes, its plan for mainstream adoption of passwordless authentication is meant as a general-purpose solution and may not always fit the most extreme security requirements.

And after all that, the tech industry will still need to turn FIDO’s white paper into actual features that are easy to use and that convert people into passwordless believers. 

“Schemes like Passkey could work and be more secure than passwords as they stand now,” says Johns Hopkins cryptographer Matthew Green. “But if the user interface for inter-device transfers sucks on some devices, it will suck for all of them, which would continue to discourage use.”

After almost a decade of work, people looking for relief from passwords are left to hope that at this point FIDO is too big to fail. When asked if this is really it, if the death knell for passwords is truly, finally tolling, Google’s Brand turns serious, but he doesn’t hesitate to answer: “I feel like everything is coalescing,” he says. “This should be durable.”


Tuesday, May 10, 2022

取代纸本证书 本月29日起生死注册程序数码化 {ref}

 

取代纸本证书 本月29日起生死注册程序数码化

字体大小:

 
  •  
  •  

随着电子出生证书的推出,父母只须在婴儿出生后,通过LifeSG应用为新生儿申请出生证书,无须再到医院或移民与关卡局大楼领取纸本出生证书。至于办理死亡证书方面,只须医生在网上签发死因证书,系统就会自动生成死亡证书。

从本月29日起,出生证书和死亡证书将全面数码化,取代纸本文件,生死注册程序也将简化。

移民与关卡局昨天(5月8日)发文告指出,从29日开始,将注册生死的程序数码化,当局将不再发出纸本的出生证书和死亡证书。过去五年内,移民与关卡局平均每年发出3万9100张出生证书和2万1900张死亡证书。

随着电子出生证书的推出,父母只须在婴儿出生后,通过LifeSG应用为新生儿申请出生证书,无须再到医院或移民与关卡局大楼领取纸本出生证书。当局仍会收取18元手续费,以应付系统开发和维修的开支。

父母在LifeSG完成登记手续,并获得下载出生证书的通知后,就能在90天内,通过移民局网站或MyICA应用下载电子出生证书,并储存在电子设备中。电子出生证书落实后,医院和移民局大楼的出生证书服务将终止。

根据生死注册法令,父母在婴儿出生的42天内,须向生死注册官(Registrar-General)报生。违例者将面对高达1500元罚款,或坐牢长达一个月,或两者兼施。

至于办理死亡证书方面,在数码化后,只须医生在网上签发死因证书,系统就会自动生成死亡证书。逝者亲属从医院获取下载死亡证书的所需信息,如死亡证书编号后,便可在30天内,通过My Legacy网站下载电子死亡证书。亲属无须像现在这样,要等医生签发死因证书,再持逝者的死因证书和身份证到公共医院、邻里警岗或移民与关卡局去申领死亡证书。

如此一来,逝者亲属可节省到注册中心的时间,全心处理逝者的后事。亲属或获亲属授权者如殡葬业者可使用电子死亡证书,到国家环境局网站申请土葬或火葬的准证。

殡葬业者郑海船受访问时说,死亡证书数码化节省了许多申请办理丧事的手续,也可以避免文件遗失。“我们将培训每个员工,确保他们熟悉新的程序。死者的亲属如果不熟悉申请电子死亡证书的程序,我们也能够协助他们。”

每份证书将印上独一无二QR码验证真伪

主管生死注册组的移民与关卡局副总监(政策与转型)陈健说,注册生死程序数码化以及电子证书的落实,对新生儿的父母会更为方便,他们可随时上网申请孩子的出生证书,省去前往移民与关卡局大楼或注册中心的时间;逝者的亲属也能节省程序上的麻烦,让他们专注于安排丧礼事务等。

她说:“这一措施让我们距离新一代服务中心(Services Centre Next Generation)的愿景又靠前一步。随着电子文件的增加,政府也计划推出一个安全的一站式电子文件储存库,让国人可以获取自身的官方文件。”

电子出生证书和电子死亡证书具有法律效力,为防止数据丢失或被盗,每份证书上将印上独一无二的QR码。政府机构、金融机构和行业协会等,可扫描QR码,连上移民与关卡局的系统,与当局的数据库进行比对,来验证证书的真伪。LifeSG、My Legacy和移民局系统内的信息都会安全地储存在政府数据库中。

不熟悉上网申请程序,或在申请过程中遇到问题的父母或亲属,可拨24小时热线65898707查询,这项热线服务在6月30日终止之后,公众若有疑问,可拨打移民局的热线电话,或到移民与关卡局大楼和ServiceSG中心询问。