{"id":6492,"date":"2015-04-30T20:44:45","date_gmt":"2015-05-01T03:44:45","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=6492"},"modified":"2015-05-03T10:59:23","modified_gmt":"2015-05-03T17:59:23","slug":"password-playdate","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2015\/04\/password-playdate\/","title":{"rendered":"Password Playdate"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/podfeet.com\/NosillaCast\/NC_2015\/NC_2015_05_03\/passwordplaydate.png\" alt=\"graphic showing two happy kids with stars and balloons\" style=\"float: right; margin: 5px;\"\/>I&#8217;ve been thinking a lot about how much using a password manager has made my online life easier and less frustrating, and of course more secure.  I have a lot of friends who don&#8217;t use password managers and I hear them complaining, watch them pull out ragged paper lists, and I know they&#8217;re not using good passwords.  I got it in my head that it would be fun to invite a bunch of my girlfriends over to something I would call Password Playdate. I&#8217;d name it that to make them think it would be fun. I  would also have to supply wine to get them to come.  My idea was to try and convince them to use a password manager, and maybe even to teach them how to set it up right then and there.<\/p>\n<p>I&#8217;ve been noodling the idea for a couple of months now but haven&#8217;t taken action on it.  When I was in India, I got an email from a guy representing a local user group asking if I&#8217;d come talk to them again.  In a weak moment (probably from lack of gin) I said yes.  He left the field open to me so I decided it was time to figure out how to actually create Password Playdate.<\/p>\n<p><!--more-->I gave the presentation just this past week and I bring it up because it was an interesting journey trying to figure out how to do this well.  I wanted to tap into their emotions about passwords and how much they hate them. Then I wanted to help them understand how password hacking works, explaining dictionary tables of known words with their equivalent hashes being compared to stolen databases of hashed passwords.  I knew that would be a rough patch, but I had some ideas on how to explain it.  That whole bit was to help them understand how bad their passwords actually are.  To prove to them that they&#8217;re bad, I&#8217;d tell them about how I got hacked years ago when Gawker Media lost some data.  Now I figured I&#8217;d have set the stage.<\/p>\n<p>Let&#8217;s assume that I&#8217;ve got their attention, and I&#8217;ve motivated them.  How do I demonstrate setting up and using a password manager without showing them my own data?  I also wanted to be fair and explain that there are options, the front runners being LastPass and 1Password, but would I have time to demonstrate both? I happen to run both in parallel because Steve still uses LastPass and we share some passwords, but it seemed that demonstrating both might introduce a whole new level of confusion.<\/p>\n<p>I&#8217;m more comfortable in 1Password so I thought I&#8217;d start there, plus I knew that 1Password has a demo vault you can set up that&#8217;s full of fake data.  That&#8217;s good because you can show all of the kinds of data that you can keep in your password manager; not only logins but license codes, credit cards, identities, drivers licenses, etc.  I figured that would be a great place to show the &#8220;reveal&#8221; button since it wouldn&#8217;t be my real data.<\/p>\n<p>But I also wanted to show how easy and happy my life is USING 1Password.  I didn&#8217;t think they&#8217;d believe me unless I could demonstrate going to a website and not ever seeing or even knowing what my password was.<\/p>\n<p>I decided to noodle it with a friend of mine that I hadn&#8217;t bothered in ages, so I got Jonathan Cost of <a href=\"http:\/\/thinkmac.net\" target=\"_blank\">thinkmac.net<\/a> on Skype with me to do a screenshare to noodle out the problem with me. Sometimes you just need another (smart) person to listen to you to figure things out.  That&#8217;s probably one of the biggest things I miss about not working. I was surrounded by brilliant people. I could go bother Nancy or Niraj or Kieran or Ryan or Keith and they&#8217;d listen to me and help me think through the hard stuff.  I have to be more resourceful now because they&#8217;re not right down the hall any more.   Now Steve IS down the hall so after I worked with Jonathan and he helped me get a strategy in place, I ran it by Steve to see if it worked and got great advice from him too.<\/p>\n<p>I decided to break this into four parts. I&#8217;d start with Keynote charts to set the stage of anxiety and fear, then do a demo from my normal Mac user account.  I realized after noodling with Jonathan that I COULD use my normal user account without danger as long as I used the browser extension and never clicked on reveal.  I logged out of Google and Amazon before I got started so I had both of those tabs ready.  Then live in front of the audience, I could log into the browser extension because the default for 1Password is to NOT show your password as you type.  That was a cool discovery.  Then I went to my Google and Amazon tabs and tapped the extension to log in and all of my private information stayed private.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/podfeet.com\/NosillaCast\/NC_2015\/NC_2015_05_03\/cloud_hackers.png\" alt=\"hackers sending a lightning bolt up to the cloud\" style=\"float: left; margin: 5px;\"\/>Ok, next thing to tackle was to convince them to use the cloud to store their data. I explained how even though the cloud is scary what we&#8217;re looking for is improving your odds. I figured I could get them all to agree that the chances that they had bad passwords today was 100%, and the chances that they&#8217;d reused a password was ALSO 100%, and that the chances of their encrypted password file being hacked was a number way way way smaller than 100%.<\/p>\n<p>But to bring that point home, I needed to give them a motivation to put their encrypted password vault into the cloud.  So that meant showing them how it worked on iOS.  I remembered a trick I heard about from Don McAllister that you can plug in your iOS device, launch QuickTime, choose file, new movie recording and then you&#8217;d be able to change the camera input to the iOS device itself, and Bob&#8217;s your uncle, your iOS device shows up on screen.  Using THAT trick I could log into 1Password using TouchID and then copy a password say to Facebook.com and log in without ever showing off my passwords.<\/p>\n<p>Ok, now I&#8217;ve got that bit figured out but it really helps to see how to <em>start<\/em> with passwords.  For this Jonathan and I figured out it would be better if I could go to a new, clean user account and install 1Password and run it for the first time.  But how do I practice if I have to be running it for the first time?  After a LOT of trial and error I was able to track down all of the plist files that Agilebits creatively tucks away in the corners of user-level Library, delete each of those, empty the trash, then remember that the mini-agent was still running, then clear them again and empty the trash and 1Password would then act like a new install.<\/p>\n<p>In the new installation then I could show them how to create a new, last password they&#8217;d ever have to remember.  Yeah, I heard it when I said it too &#8211; &#8220;This is the last suit you&#8217;ll ever wear.&#8221;  This is where I got tangled again on how to do this linearly: I want to demonstrate the tool, but I also wanted to show them how to create a good password.  Do I interrupt the flow and go over to Bart&#8217;s fabulous <a href=\"http:\/\/xkpasswd.net\" target=\"_blank\">xkpasswd.net<\/a> to demonstrate how easy it is to get a good password, and hammer home how whatever they&#8217;re thinking of is a bad idea?  Once there, would&#8217;t I be tempted to go to <a href=\"https:\/\/www.grc.com\/haystack.htm\" target=\"_blank\">Steve Gibson&#8217;s Password Haystack tool<\/a> to do more demonstrations of how to improve your password?  But if I don&#8217;t go down that rathole, I might still lose them on the motivation.  Are you getting why this was so hard?<\/p>\n<p>Setting that question aside, I knew I could show them the demo vault and how the reveal thing works and show off all of the other cool features of 1Password.  I noodled this whole thing with <a href=\"http:\/\/denglerconsulting.com\" target=\"_blank\">Pat Dengler of Dengler Consulting<\/a> and she suggested I switch to a blank vault and try creating a few logins at some rewards program sites like CVS and Sports Chalet.  If I did that, I didn&#8217;t want to start getting spammed on my real email account so I created a demo email address at podfeet.com.  Brilliant, now we&#8217;re getting somewhere.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/podfeet.com\/NosillaCast\/NC_2015\/NC_2015_05_03\/security_challenge.png\" alt=\"shows the 1P and LP and how they test your passwords\" style=\"float: right; margin: 5px;\"\/>Now let&#8217;s just pretend I haven&#8217;t lost them yet.  My next phase was to suggest to them that they&#8217;re all feeling this would be WAY too hard.  I created some charts suggesting that they start slow. I suggested they just GET a password manager, and get one last good gnarly password (I told them it should be upper and lower case letters, numbers, symbols, special characters, and maybe a goat if they could fit it in there).  Then I would suggest they simply log into the tool and as they went about their normal day to allow the tool to collect their passwords.  After a few weeks, then I would suggest they run the security check in their tool of choice to see how awful their passwords really are.  I could even tell them how bad mine actually were!<\/p>\n<p>Then I thought I could steal again from Bart and tell them to protect crown jewels first &#8211; fix the passwords on their bank accounts, credit cards and health insurance.  Then they could just fix a few a week.  I stole from <a href=\"http:\/\/relay.fm\/mpu\/\" target=\"_blank\">Katie Floyd of Mac Power Users<\/a> when she talks about going paperless &#8211; she says, &#8220;stop digging the hole&#8221;.  By that she means at least from today forward, do things the way you WANT to do them.  Maybe you go back and fix the past but at least make good passwords going forward.  I figured this would be a good point to tell them how to use 1Password&#8217;s built-in password creation tool.  To be honest I hadn&#8217;t used it before working on this because I always use the Service Bart taught us to build a while back that taps into the math behind his xkpasswd tool.<\/p>\n<p>If I hadn&#8217;t lost them by then, I knew there were a couple more critical things to tell them.  Number one was to give their one password to someone else for safe keeping in case they forgot it.  I could tell them how Steve and I do it &#8211; we have each other&#8217;s password in each other&#8217;s vault.  The chances that we both lose our minds on the same day is pretty slim, right?  I could also suggest a safe deposit box as a great place to store that one last password they&#8217;d ever need.<\/p>\n<p>Well guess what?    It worked. I did the presentation pretty much exactly as I&#8217;ve described here, including going down the rathole of explaining Steve Gibson&#8217;s password haystack and Bart&#8217;s xkpasswd tool.  The only place I truly lost most of them was in trying to explain how passwords are hacked. I used an analogy of a potato being mashed and how you can&#8217;t unmash the potato, but if you could mash enough potatoes till you found the identical mash you&#8217;d know you had the right potato.  I know, as I&#8217;m saying it now I realize what a bad analogy that is!<\/p>\n<p>Steve jumped in and tried to help me clarify things but I think I&#8217;d already lost them by that time.  I&#8217;ll probably do a question in Google Plus on this asking if anyone has come up with an easy way to explain how a hashed dictionary file is compared to a hashed username and password database to find matches and ultimately the person&#8217;s username\/password combo.  <\/p>\n<p>The good news is that at the end I think I had them back on track and when I asked how many of them truly thought they would go forward with this and about half of them said they would!  My favorite person in the audience though was a woman who sat right in front, asked gobs of very intelligent and insightful questions and at the end she shook her head and said, &#8220;Nope.  Can&#8217;t get over the idea of securing everything with one password.&#8221;  I liked her because she was honest about it and was examining carefully what the pros and cons were.  I&#8217;m pretty sure she&#8217;ll eventually come over because she clearly understood the problem.<\/p>\n<p>My Keynote charts are mostly pictures that I talked to but I put a <a href=\"https:\/\/podfeet.com\/NosillaCast\/NC_2015\/NC_2015_05_03\/password_playdate.zip\" target=\"_blank\">link to download a zip file of them in the shownotes<\/a> if you&#8217;d like to take a look.  It might be helpful to look at the speaker notes too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve been thinking a lot about how much using a password manager has made my online life easier and less frustrating, and of course more secure. I have a lot of friends who don&#8217;t use password managers and I hear them complaining, watch them pull out ragged paper lists, and I know they&#8217;re not using [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147],"tags":[],"class_list":["post-6492","post","type-post","status-publish","format-standard","hentry","category-blog-posts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=6492"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6492\/revisions"}],"predecessor-version":[{"id":6498,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6492\/revisions\/6498"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=6492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=6492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=6492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}