Terence Eden. He has a beard and is smiling.

Terence Eden’s Blog

Theme Switcher:

Review: Pebblebee Clip Universal - and Android "Find My Device" Tracker

· 2 comments · 1,250 words · Viewed ~2,102 times


The disk has a USB-C socket at the bottom and flashing lights on the side.

Android is belatedly getting a Bluetooth tracker feature which doesn't rely on proprietary apps. Long-time readers will know that back in 2016 I reviewed both the Chipolo and the TinTag. Both of those were adequate at finding things which were in range of your phone, but hopeless at finding lost items - because they required everyone to have a special app installed. But now, under pressure from …

Should you enable TOTP *only* authentication?

· 10 comments · 300 words · Viewed ~255 times


A QR code.

Here's a "fun" thought experiment. Imagine a website which let you sign in using only your username and TOTP code. No passwords. No magic links emailed to you. No FIDO tokens. No codes via SMS. Just a TOTP generated and displayed on your device. Is that useful? Sensible? Practical? It's certainly technically possible. Store the username, store the TOTP seed, done. Your users can now log in. …

A decade later, has my mobile security advice changed?

· 7 comments · 1,750 words · Viewed ~350 times


Logo for 361 degrees podcast.

A decade ago, I appeared on the 361 Podcast to give my advice about mobile security. This was the era of the iPhone 5 and Android KitKat. BlackBerry was trying to have (yet another) resurgence and Nokia was desperately trying to keep Windows Phone alive. What advice did I give then, and is it still relevant? Stay Sceptical In at number five is just stay sceptical. I mean, quite often, lots…

Psssst! Your date of birth can be a random number!

· 15 comments · 300 words · Viewed ~2,928 times


A graphic of a calendar showing the date "February 25 Sunday"

For lots of online accounts, a date of birth is nothing more than a very weak second factor. The majority of places aren't checking your identity, cross-referencing your birthdate, and personalising your experience based on your Zodiac sign. At most, they'll wish you a happy birthday and / or let you recover your account by providing your date of birth. But, of course, lots of people know your…

Is it OK to share 2FA secrets?

· 4 comments · 300 words · Viewed ~235 times


A QR code.

Yeah. Yeah, I reckon so. Under the right circumstances. Multi-Factor Authentication (MFA, 2FA, TOTP, whatever you want to call it) is pretty nifty. You scan a QR code and your phone will continually generate a set of one-time passwords which are synchronised with a remote server. There's nothing stopping multiple people from scanning that QR code! They will each have the same password displayed …

QR Code Hijacking Attempts Are Pretty Inept

· 3 comments · 650 words · Viewed ~426 times


A poster behind some glass. A paper QR code is stuck on top of the glass. It is easy to see it is a replacement code.

I've been writing about QR codes since 2007 - long before they were fashionable. Because QR Codes are so cheap to produce, there has always been a concern that attackers might print out their own codes and stick them over legitimate ones. When I first wrote about QR Hijacking in 2011, I said that such attacks were usually easy to spot: Recently, a new wave of QR Hijacking attacks have been…

Cybersecurity and Shakespeare - a brief look at how technology can prevent tragedy

· 4 comments · 950 words


A pixelated Shakespeare.

Shakespeare, famously, shunned computers. Like some sort of retro hipster, he didn't write his plays on a laptop, refused to use spellcheck, and didn't register his copyright on the blockchain. Lord, what fools these mortals be! What would Shakespeare's plays have been like if their characters understood basic cybersecurity? Now, it is true that very few of his plays feature computers, but…

How random are TOTP codes?

· 5 comments · 350 words · Viewed ~8,037 times


Histogram of distributions. 8 is clearly higher than the rest.

I'm pretty sure that the 2FA codes generated by my bank's TOTP app have a bias towards the number 8 - because eight is an auspicious number. But is that just my stupid meaty brain noticing patterns where none exist? The TOTP algorithm uses HMAC, which in turn uses SHA-1. My aforementioned brain is not clever enough to understand how that works. Although bigger, meatier brains have assured me it …

Password Resets in an Age of MFA

· 3 comments · 100 words · Viewed ~339 times


A padlock engraved into a circuit board.

Recently, WordPress got in contact with me to say they suspect that my password was exposed in some sort of data breach. Well, it's a day ending with a "y" - so of course some scumbag has pilfered my digital identity. WordPress mandated that I change my password. But was that really necessary? Firstly, the password was uniquely generated by my password manager. It isn't re-used anywhere else.…

The irony of TicketMaster's breach notification email

· 4 comments · 250 words · Viewed ~830 times


What is Ticketmaster doing to protect customers? We have been working with industry-leading cybersecurity experts, the relevant authorities, including law enforcement, as well as credit card companies and banks. No further unauthorised activity has been seen in the cloud database since we began our investigation. We are offering you a free 12-month identity monitoring service with TransUnion. These services will be provided by Cyberscout, a TransUnion company specialising in fraud assistance and remediation services. You can sign up for this service through the following link: https://bit.ly/TU-sign-up What can I do? There is nothing you need to do. However, exposure of personal information can, in some cases, increase the risk of identity theft or fraud, so it’s always a good idea to monitor your bank accounts. If you notice any suspicious activity, contact your bank and/or credit card companies. Be cautious of unsolicited emails from unknown senders, especially those with unusual content, links, attachments, or requests for personal information over the phone. If you have any questions, you can visit https://bit.ly/Ticketmaster-Data-Security-Incident or contact us at ticketmastersupport@ticketmaster.com. Ticketmaster understands the importance of your personal information and we take its protection very seriously. We apologise for having to write to you in these circumstances.

TicketMaster has joined the long list of companies to lose their customers' information. As is common, they sent out an email to warn poor sods like me who might have had our details snaffled. Their email is particularly poor and contains a delightful example of how not to communicate issues like this. See if you can spot it: In the same breath as warning their customers to look out for…

You can outsource risk, but you can't outsource reputation

· 400 words · Viewed ~201 times


Cyber attack hits major London hospitals. ‘Significant impact’ on King’s College Hospital, Guy’s and St Thomas’ and south-east London GP services, say NHS leaders. A cyber attack has crippled three major London hospitals, causing operations, blood tests and transfusions to be delayed for weeks. The National Cyber Security Centre (NCSC) is investigating the source of the ransomware attack, which led to chaos in A&E departments on Tuesday. NHS leaders said there had been a “significant impact” on King’s College Hospital, Guy’s and St Thomas’ and GP services in south-east London. The Telegraph understands that security sources believe the hack to bear the hallmarks of a criminal activity. The attackers behind it are believed to be

Over the last few weeks, I've had several people ask me about the recent hack on the NHS. A ransomware attack has meant that several hospitals have cancelled operations and there is now an urgent demand for blood donors. What does it say about the state of NHS IT that this attack has happened? Nothing. Because the NHS was not hacked. Instead, a company they use to perform blood tests was…

A security bug caused by… Dark Mode!

· 300 words · Viewed ~245 times


Image is of a Green Shield with a white tick.

Everyone loves Dark Mode. It is kinder on the eyes, less energy intensive, and looks hecking cool. *5 seconds later* We regret to inform you that Dark Mode causes security bugs. (With apologies to Ben Ward) OK, OK. This isn't a particularly severe security bug, but I found it interesting. The Matrix messaging app "Element" lets you sign in to your account on multiple devices. In order to…