[tor-dev] Hash Visualizations to Protect Against Onion Phishing
yawning at schwanenlied.me
Thu Aug 20 14:41:51 UTC 2015
On Thu, 20 Aug 2015 17:02:24 +0300
George Kadianakis <desnacked at riseup.net> wrote:
> Jacek Wielemborek <d33tah at gmail.com> writes:
> > W dniu 20.08.2015 o 15:49, George Kadianakis pisze:
> >> Some real UX research needs to be done here, before we decide
> >> something terrible.
> > Just curious, has anybody seen any cognitive studies on the SSH
> > randomart visualisation? I always found them impossible to remember.
> > Perhaps adding a bit more color could help...
> Hm. Indeed.
> I can remember the general shape and edges of my SSH server's key,
> but not any details.
> I doubt I would remember the randomart of like 10 onion websites,
> especially if I didn't visit them regularly. But maybe I would
> remember the randomart of my webmail better than my SSH server's.
What would be useful here is the number of onion addresses an average
user visits. If it's small, something like this would probably be
0. Browser generates/stores a long term salt.
1. On onion access, calculate SHAKE(salt | onion address) map that to
a poker hand (5 card draw).
P(52,5) = 311,875,200
C(52,5) = 2,598,960
2. Goto 1.
0. Collisions between addresses are unlikely and don't weaken the
scheme (though it will be confusing to the user that does encounter
1. Brute-forcing is mitigated via the per-client salt.
2. Incomplete recall still useful (User needs to forget all of order,
suite, and card value).
3. Easy to memorize.
4. Easy to extend up to a point.
5. Can probably display it with fonts present on the system (or the
one that will be bundled).
0. Having to propagate the salt value if the user uses multiple boxes
is somewhat annoying.
1. May get confusing to remember lots and lots of onions->hand
2. No "canonical" visualization that can be shared across users.
3. Something Yawning randomly made up before going to bed.
Regards and good night,
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the tor-dev