Authentication at Google:�Beyond Passwords and Towards Devices
Dirk Balfanz�
Cloud Identity Summit · June 2015 · San Diego
Bearer Tokens
| Phishing | Password�Sharing | Network�Attacks | Client�Compromise | Server�Compromise |
Passwords | ! | ! | ! | ! | ! |
Cookies | | | ! | ! | ! |
Bearer Tokens
| Phishing | Password�Sharing | Network�Attacks | Client�Compromise | Server�Compromise |
Passwords | ! | ! | ! | ! | ! |
Cookies | | | ! | ! | ! |
Crypto to the Rescue!
Password
Password
Password Reuse
Phishing
Interception
Crypto to the Rescue!
Test of User Presence
Public-Key�Crypto
Password Reuse
Phishing
Interception
Interlude: Smart Lock
Smart Lock for Android
Wearable
Trusted�Devices
Location
Trusted Voice
On-Body Detection
Smart Lock for Chromebook
Crypto to the Rescue!
Password Reuse
Phishing
Interception
Crypto-Based Logins
Crypto-Based Logins
password
password
password
password
Crypto-Based Logins: Coming Up
�Necessary first step: separate username & password input during login!
password
Crypto-Based Logins: Coming Up
password
�Use help of carrier: Mobile OpenID Connect��(unsolved issues: trust in carriers, something-you-know/are as a 2nd factor)
You can help!
Use this pattern.
Test of User Presence
Public-Key�Crypto
FIDO-enable�your web site.
Test of User Presence
Public-Key�Crypto
Don’t ask for�passwords.
Test of User Presence
Public-Key�Crypto
Bind cryptographic�keys to biometrics�or screen locks.
Test of User Presence
Public-Key�Crypto
password
If you’re an MNO: Help us solve this use case!
Thanks!