Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by Cactus on Tuesday February 18 2014, @01:18AM   Printer-friendly
from the I-want-a-whistle-in-my-cereal dept.
Gaaark writes:

Google acquires SlickLogin: dogs go wild!

SlickLogin, an Israeli start-up, is behind the technology that allows websites to verify a user's identity by using sound waves. It works by playing a uniquely generated, nearly-silent sound through your computer speakers, which is picked up by an app on your smartphone. The app analyses the sound and sends a signal back to confirm your identity.

The firm confirmed the acquisition on its website but did not provide any financial details of the deal.

Too bad they don't still put whistles inside packages of Cap'n Crunch cereal!

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by koreanbabykilla on Tuesday February 18 2014, @01:21AM

    by koreanbabykilla (968) on Tuesday February 18 2014, @01:21AM (#1254)

    This should make work interesting if it becomes popular.

    • (Score: 5, Interesting) by siliconwafer on Tuesday February 18 2014, @01:25AM

      by siliconwafer (709) on Tuesday February 18 2014, @01:25AM (#1257)

      I wonder how close to "silent" it really is. What if my PC's volume is maxed? Or muted? What if I use headphones?

      • (Score: 5, Insightful) by Khyber on Tuesday February 18 2014, @01:28AM

        by Khyber (54) on Tuesday February 18 2014, @01:28AM (#1260) Journal

        Even better, what if my speakers don't have the response range to reproduce that frequency?

        D'oh!

        --
        Destroying Semiconductors With Style Since 2008, and scaring you ill-educated fools since 2013.
        • (Score: 2) by Angry Jesus on Tuesday February 18 2014, @03:00AM

          by Angry Jesus (182) on Tuesday February 18 2014, @03:00AM (#1324)

          Even better, what if my speakers don't have the response range to reproduce that frequency?

          Pick a frequency that any consumer grade speaker will be able to reproduce, like something in the human vocal range?

          Use more than one frequency?

          It's weird how people play dumb when trying to shoot something down, as if their lack of imagination proves that someone else is incompetent.

          • (Score: 5, Insightful) by KibiByte on Tuesday February 18 2014, @03:06AM

            by KibiByte (1024) on Tuesday February 18 2014, @03:06AM (#1329)

            The problem here is 'nearly silent' which pretty much indicates to me that this would be done around the outside of the typical range of hearing for an adult but is still reproducible by typical consumer-grade hardware. That's roughly a range of 6KHz to play around in, for most adults.

            But the problem is making sure nobody else is hearing it, which means low power. Higher frequencies require higher amounts of power to go any truly appreciable distance. Inverse square makes this even worse.

            This is similar to the 'audio bug' that was discussed on other sites last month. Just as infeasible now as it was then.

            --
            The One True Unit UID
            • (Score: 3, Informative) by Angry Jesus on Tuesday February 18 2014, @04:38AM

              by Angry Jesus (182) on Tuesday February 18 2014, @04:38AM (#1397)

              I think you are reading more into "nearly silent" than is there. It could simply refer to volume. After all, part of the description is that the user holds his phone up to the speaker.

              • (Score: 1) by dmc on Tuesday February 18 2014, @05:19AM

                by dmc (188) on Tuesday February 18 2014, @05:19AM (#1419)

                "
                I think you are reading more into "nearly silent" than is there. It could simply refer to volume. After all, part of the description is that the user holds his phone up to the speaker.
                "

                I wanted to mod you informative for RTFA, but I wanted even less to RTFA myself. Until you said this, I too was presuming it was less user-intensive than holding the phone up to a speaker that isn't muted (e.g. due to headphone usage). I of course thought that due to remembering the audio-transmission virus some security research detected that is an attack against non(traditionally)networked systems. (it wasn't actually infection while offline, but reinfection using the audio-networking to get the full virus code back after a ram/disk wipe. I.e. advanced persistent threat hiding in firmware that is just smart enough to be able to fetch the rest of its code from network if available, or even over the air with such inaudible audio if need be)

                • (Score: 1) by dilbert on Tuesday February 18 2014, @02:26PM

                  by dilbert (444) on Tuesday February 18 2014, @02:26PM (#1612)
                  I think the malware you're referring to was called BadBIOS
                  • (Score: 1) by dilbert on Tuesday February 18 2014, @02:30PM

                    by dilbert (444) on Tuesday February 18 2014, @02:30PM (#1614)
                    Doesn't look like my linking worked. Here is the link to BadBIOS:

                    http://arstechnica.com/security/2013/10/meet-bad bios-the-mysterious-mac-and-pc-malware-that-jumps- airgaps/

            • (Score: 5, Informative) by Angry Jesus on Tuesday February 18 2014, @05:45AM

              by Angry Jesus (182) on Tuesday February 18 2014, @05:45AM (#1429)

              This is similar to the 'audio bug' that was discussed on other sites last month. Just as infeasible now as it was then.

              I missed that line when I first responded. You need to read this paper.

              http://www.jocm.us/index.php?m=content&c=index&a=s how&catid=124&id=600 [www.jocm.us]

              Some scientists at Fraunhofer were able to do exactly what the BadBios guy was claiming - covert acoustical mesh networking using nothing more than off-the-shelf lenovo laptops and well-known software algorithms. Nothing about viral replication, just the acoustic data transmission part.

              • (Score: 1) by KibiByte on Tuesday February 18 2014, @06:11AM

                by KibiByte (1024) on Tuesday February 18 2014, @06:11AM (#1437)

                That's a pretty good read. Sadly, it appears they're using the same models and units. I'd like to see this done across different units with similar results, as one of the original BadBios claims was something that could infect any computer, running any OS.

                --
                The One True Unit UID
              • (Score: 0) by Anonymous Coward on Thursday March 06 2014, @09:08AM

                by Anonymous Coward on Thursday March 06 2014, @09:08AM (#11841)

                mM7Pgd wine , garcinia cambogia extract [studioxnyc.com], [url=http://studioxnyc.com/]garcinia cambogia extract[/url], http://studioxnyc.com/ [studioxnyc.com] garcinia cambogia extract, 670,

        • (Score: 1) by Popeidol on Tuesday February 18 2014, @04:39AM

          by Popeidol (35) on Tuesday February 18 2014, @04:39AM (#1398) Journal

          It could handle that with a negotiation phase, like dial-up modems. Initial contact is made at a frequency that all functional speakers and microphones can handle, and it steps up from there until they reach failure (or a predetermined max). Then they drop to the last known good frequency and start the verification.

          You could make it pretty fast, and aside from an initial chirp it'd happen as quietly as your equipment allows.

  • (Score: 5, Insightful) by everdred on Tuesday February 18 2014, @01:23AM

    by everdred (110) on Tuesday February 18 2014, @01:23AM (#1255) Journal

    Or another one nearby?

    • (Score: 2, Insightful) by KibiByte on Tuesday February 18 2014, @01:25AM

      by KibiByte (1024) on Tuesday February 18 2014, @01:25AM (#1256)

      That was my exact same thought. But then again, physical presence is always the greatest security threat.

      --
      The One True Unit UID
    • (Score: 1) by efernsler on Tuesday February 18 2014, @01:26AM

      by efernsler (1035) on Tuesday February 18 2014, @01:26AM (#1258)

      Exactly. One wonders what 'nearby' means to the audio signal. 1'? 5"?

    • (Score: 5, Insightful) by Nerdfest on Tuesday February 18 2014, @01:30AM

      by Nerdfest (80) on Tuesday February 18 2014, @01:30AM (#1263)

      If I were to do something like this, the server would encrypt a random number with the public key of the client. The client would decrypt, and send it back encrypted with the public key of the server. If the numbers matched, you get authenticated. I'm not a cryptography or authentication expert, but I'm pretty sure that would work without any problem with eavesdropping. I'm really hoping they didn't get a patent on this ...

      • (Score: 2, Insightful) by everdred on Tuesday February 18 2014, @01:40AM

        by everdred (110) on Tuesday February 18 2014, @01:40AM (#1270) Journal

        Ah, so the phone would have to have been already authenticated; this is just checking to see if the known phone is present?

        I imagined the idea behind this tech was to easily pair devices.

        • (Score: 2, Funny) by Nerdfest on Tuesday February 18 2014, @02:07AM

          by Nerdfest (80) on Tuesday February 18 2014, @02:07AM (#1287)

          Following a fine tradition, I didn't read TFA, am studying for a beer exam (yes, really), and came up with this in less than 10 seconds. It seems to me to be a great way to do a key exchange based authentication, but it was admittedly a very quick effort that may be flawed.

          • (Score: 2, Funny) by Gaaark on Tuesday February 18 2014, @03:46AM

            by Gaaark (41) on Tuesday February 18 2014, @03:46AM (#1369) Journal

            Is that an oral exam?

            Me hop(p)ing so! :)

            Stout fellow, you! (Now where's that Porter with my beer?)

            --
            --- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
        • (Score: 1) by Qzukk on Tuesday February 18 2014, @02:35AM

          by Qzukk (1086) on Tuesday February 18 2014, @02:35AM (#1300) Journal

          That seems to be the point of it: to authenticate using the proximity of your phone to the computer's speakers. Since the computer and the phone would need to communicate (either directly or indirectly) for the computer to know that the phone had received the signal and OK'd it, I'd expect this to be the second factor in 2FA (so the computer already knows which phone it should expect confirmation from).

          Nifty, but it's basically just saving 6 keystrokes for Google Authenticator.

      • (Score: 2, Informative) by edIII on Tuesday February 18 2014, @10:15PM

        by edIII (791) on Tuesday February 18 2014, @10:15PM (#1973)

        That's really no different of an authentication scheme than one that just goes through the Internet. Authentication is performed because the smartphone decrypted a payload to send back. That smartphone still needed to be secured through other means.

        What this is really more like is out-of-band key exchange.

        Website sends random number in plain-text. Smartphone detects random number. Smartphone applies agreed upon mixing procedure (probably traditional crypto) and sends back through communications medium that is different than website-device being authenticated.

        An eavesdropper would need to present in all 3 mediums, as well as the attacker. Website-Internet, Physical Environment, Smartphone-Internet.

        Out-of-band is not a new concept either. Google already has a patent on another form of out-of-band key exchange.

        --
        Technically, lunchtime is at any moment. It's just a wave function.
  • (Score: 5, Interesting) by tftp on Tuesday February 18 2014, @01:26AM

    by tftp (806) on Tuesday February 18 2014, @01:26AM (#1259) Homepage

    The SlickLogin's web site says nothing about the mechanics. I can imagine that the sound is a random challenge; the phone would decode it, encrypt with personal key, perhaps tied to the unique serial number of the phone, and send it to the site... but what's the point of the audio segment? Wouldn't it be better to, say, display a full screen QR code for the phone to read? How would you even identify the phone reliably, if the attacker can duplicate that number with ease?

    I can also think of other issues with this scheme. Without knowing more, I wouldn't be too interested in this company.

    • (Score: 1) by everdred on Tuesday February 18 2014, @01:29AM

      by everdred (110) on Tuesday February 18 2014, @01:29AM (#1261) Journal

      > but what's the point of the audio segment? Wouldn't it be better to, say, display a full screen QR code for the phone to read?

      For mobile devices without cameras? Do those still exist?

      • (Score: 1) by regift_of_the_gods on Tuesday February 18 2014, @01:50AM

        by regift_of_the_gods (138) on Tuesday February 18 2014, @01:50AM (#1276)

        Or send a string of five or six base64 characters to the phone screen that the user has to enter into the web site authentication dialog. Yeah, I'm not sure why the audio makes it stronger. Seems to be based on what you have - the phone running the SlickLogin app - with a weak second factor based on positional data.

        • (Score: 1) by tftp on Tuesday February 18 2014, @02:50AM

          by tftp (806) on Tuesday February 18 2014, @02:50AM (#1315) Homepage

          The authentication is *only* based on what you have because no action on your part is required. This is good for the Twitbook generation who cannot be bothered to enter passwords. However this is bad if you leave your phone at the desk and go to the bathroom because anyone can log in as you.

          I do not understand why the phone can even be that "something you have" - phones are not unique, and they are not tamper-proof. There are a few serial numbers in each phone, but you can always run the code in a VM (just as it runs on the phone itself) and fake those numbers.

          Yet another aspect is that phones have short life. Cellular providers push for a 2-year replacement plan to keep the users under the contract. However it would be impractical to update login information for all your sites, especially if the old phone is gone (and it is, since you move the service onto the new one.) Phones are often lost or damaged. I understand that all the entrepreneurs in the world, like this gang, are dreaming up the new ways of using the phone... but this auth method appears to be overly complicated. Sure, two factor and all that is good for you, but people who know about security will never trust this method, and people who don't want to know about security will use a password that reads as "password." In other words, nothing will change.

          • (Score: 1) by regift_of_the_gods on Tuesday February 18 2014, @03:29AM

            by regift_of_the_gods (138) on Tuesday February 18 2014, @03:29AM (#1356)

            I assumed the smartphone has a chip with a private key or some other secret that can securely identify itself to service providers when placing or accepting a call. That's what I meant. I don't know the details.

            • (Score: 1) by tftp on Tuesday February 18 2014, @04:22AM

              by tftp (806) on Tuesday February 18 2014, @04:22AM (#1393) Homepage

              I assumed the smartphone has a chip with a private key or some other secret that can securely identify itself to service providers when placing or accepting a call

              A phone (smart or not) does have such an ID. However, it is not tamper-proof, and it can be simulated. Besides, this ID is only available to the cellular provider; they need it to know what phones to service and what phones to reject. If a Java application on a smartphone opens a TCP connection to a 3rd party server, there will be no such information embedded. You only get the IP address. The HTTP request may contain some headers... but they are only what YOU send; and you can send whatever you want. In other words, your phone can only authenticate to the cellular provider, but not to 3rd parties. This is good because otherwise your phone can be uniquely identified and tracked by every web site in existence.

              In order to securely authenticate on application level the phone has to have some TPM hardware [trustedcom...ggroup.org]. I do not think that today's smartphones have TPM despite the obvious interests of TPM vendors. Eventually this may happen.

    • (Score: 1) by siliconwafer on Tuesday February 18 2014, @01:33AM

      by siliconwafer (709) on Tuesday February 18 2014, @01:33AM (#1266)

      How I would implement it: Computer sends a unique sequence of data at every login attempt as barely audible 60wpm morse code. Have the phone hash it using some salted key that is unique to the phone, and have the phone echo the hash back for matching purposes with whatever is in the database. Oh yeah, and ROT13 for good measure.

      But a random sound? That's no fun. I want to pick a custom one, kind of like a ring-tone. And I request this one.
      http://www.youtube.com/watch?v=qjPQYdTYmKM [youtube.com]

    • (Score: 3, Interesting) by Angry Jesus on Tuesday February 18 2014, @01:41AM

      by Angry Jesus (182) on Tuesday February 18 2014, @01:41AM (#1271)

      My guess is that they are "fingerprinting" the phone's microphone in order to make it into a unique token. Kind of like the way every camera lens uniquely distorts images so that if you know what the picture should look like you can figure out which camera took the picture by comparing the differences between original and photograph.

      • (Score: 1) by Nerdfest on Tuesday February 18 2014, @02:02AM

        by Nerdfest (80) on Tuesday February 18 2014, @02:02AM (#1283)

        Probably not reliable enough and wouldn't work for people with multiple devices. Great idea if there's enough identifiable distinction though.

      • (Score: 4, Informative) by tftp on Tuesday February 18 2014, @02:04AM

        by tftp (806) on Tuesday February 18 2014, @02:04AM (#1285) Homepage

        My guess is that they are "fingerprinting" the phone's microphone in order to make it into a unique token.

        Impossible for 3 reasons:

        1. Many phones may have the same characteristics of their microphones (they are repeatably made)
        2. The phone's response is affected by the environment (echo, attenuation, external noises, holsters, bumpers, hands.)
        3. The speakers that emit the sound are part of the deal... and you do not authenticate with them.
        • (Score: 2, Informative) by Angry Jesus on Tuesday February 18 2014, @02:55AM

          by Angry Jesus (182) on Tuesday February 18 2014, @02:55AM (#1318)

          1. Many phones may have the same characteristics of their microphones (they are repeatably made)

          Manufacturing tolerances always vary, especially for consumer-grade equipment. The chance that someone trying to crack your account has the same set of variations is going to be small. This isn't the kind of thing that needs to be perfect, it just needs to be good enough, like the iphone's fingerprint sensor.

          2. The phone's response is affected by the environment (echo, attenuation, external noises, holsters, bumpers, hands.)

          Those are all of a completely different category of variations. Echo? That's time-domain, not even frequency domain.

          3. The speakers that emit the sound are part of the deal... and you do not authenticate with them.

          Doesn't matter, that's just noise to be filtered out. Sure, if the speakers are really bad, then it will be too noisy to work. But see the first point -- it just has to be good enough, not perfect.

          • (Score: 2, Informative) by tftp on Tuesday February 18 2014, @05:38AM

            by tftp (806) on Tuesday February 18 2014, @05:38AM (#1427) Homepage

            Manufacturing tolerances always vary, especially for consumer-grade equipment.

            It takes pretty good test equipment (Rohde & Shwartz) and an anechoic chamber to decently characterize a microphone. I made some measurements in such a lab in university. I cannot imagine what can you measure in open air, using random sources that are "barely audible" and in presence of stray signals.

            Echo? That's time-domain, not even frequency domain.

            Praise Fourier that they are not two interchangeable representations of the same physical process :-) In this case the echo will add another component, with the same frequency and a different phase. These components will add up, changing the amplitude of the resulting response... but since this is frequency-dependent (the delay is a fixed time,) the frequency response gets peaks and valleys. That's how those loudspeakers' enclosures shape the frequency response - by using boundary conditions.

            Doesn't matter, that's just noise to be filtered out.

            The frequency response of the system is mic(f) * speakers(f). If speakers change, the response changes as well. Since speakers and microphones are horribly nonlinear, harmonic content will be also severely affected by different speakers.

            • (Score: 1) by Angry Jesus on Tuesday February 18 2014, @06:08AM

              by Angry Jesus (182) on Tuesday February 18 2014, @06:08AM (#1433)

              It takes pretty good test equipment (Rohde & Shwartz) and an anechoic chamber to decently characterize a microphone.

              You are thinking about it completely in reverse - this isn't about minimizing distortion, it is simply about distinguishing between different units. Similar to the way that forensic DNA matching only looks at 10-12 markers when that is a tiny fraction necessary to describe a human.

              The frequency response of the system is mic(f) * speakers(f). If speakers change, the response changes as well

              That's far too simplistic. Off the top of my head I can think of at least one method that isn't affected so straight-forwardly - measuring harmonic response ratios. Even if the speakers' output levels vary at a specific frequency, the microphone will have its own set of harmonics in relation to the generated tones. The speaker will have its own harmonics too, but all that extra noise won't matter because we are only looking for the harmonic signature of the microphone. I'm sure there are other relationships that could be profiled if someone were to spend more than 30 seconds thinking about it.

    • (Score: 1) by edIII on Tuesday February 18 2014, @10:19PM

      by edIII (791) on Tuesday February 18 2014, @10:19PM (#1977)

      It's a novel form of out-of-band key exchange.

      In of itself, it does not seem to be anything special, or tremendously difficult to hack. It just sounds like a really cool idea, and sometimes it really is just the story, or form over function.

      However, it does seem that you would need to attack multiple networks simultaneously. That raises the bar somewhat, but nothing that would seem to frustrate the NSA too much. I've bet they seen much harder nuts to crack in the TAO. .... That being said though, how many smartphones suffer from malware and their own dedicated industry providing smartphone malware tools?

      --
      Technically, lunchtime is at any moment. It's just a wave function.
  • (Score: 4, Funny) by internetguy on Tuesday February 18 2014, @01:42AM

    by internetguy (235) on Tuesday February 18 2014, @01:42AM (#1272)

    My Voice Is My Passport, Verify Me.

    --
    Sig: I must be new here.
    • (Score: 1) by wjwlsn on Tuesday February 18 2014, @01:59AM

      by wjwlsn (171) on Tuesday February 18 2014, @01:59AM (#1280) Homepage Journal

      Loved that movie. Seems quaint now.

      --
      I am a traveler of both time and space. Duh.
    • (Score: 3, Interesting) by combatserver on Tuesday February 18 2014, @02:02AM

      by combatserver (38) on Tuesday February 18 2014, @02:02AM (#1282)

      "My Voice Is My Passport, Verify Me."

      Now we know why the computer on the Enterprise in Star Trek seemed to pass out information about other crew members like cookies--it was verifying security status of the person talking, not only by a signal from the person's communicator (tech in the article!), but by voice recognition as well, for secondary confirmation.

      I am beginning to think that all the wild tech we are seeing in the last 10-15 years was designed decades ago and was "leaked" via Star Trek in an effort to acclimatize us to the lack of privacy said tech would inevitably lead to.

      --
      I hope I can change this later...
      • (Score: 1) by dmc on Tuesday February 18 2014, @05:35AM

        by dmc (188) on Tuesday February 18 2014, @05:35AM (#1425)

        "
        I am beginning to think that all the wild tech we are seeing in the last 10-15 years was designed decades ago and was "leaked" via Star Trek in an effort to acclimatize us to the lack of privacy said tech would inevitably lead to.
        "

        I think there have only been about 10 trek episodes that covered that theory. Personally I'm pretty sure The X-Files was authorized by the Clintons as a way to reveal classified truths that the overlords don't feel we are ready to know without wrapping them up in several layers of extended metaphor. I'm from Kansas in the heart of the Bible Belt. I can sympathize with the overlords if for instance 15 years ago clear-cut evidence of (e.g. simple non-sentient) life was detected on mars. People around here couldn't have dealt with that reality 15 years ago. Today, maybe. For instance, I recall clearly personally predicting the existence of life more toward the hot-core of the earth a couple years before scientists were 'shocked' to find it (e.g. the hot vents at the bottom of the ocean). After staring at Conway's game of life enough, I find it extremely hard to believe that wherever there are high amounts of energy (earth's core, sun, surface of mars) that life wouldn't find a way to emerge easily enough. Call me crazy all you want- I'll be amused to look back at this comment in 2 or 3 decades if I'm still alive.

  • (Score: 1) by Subsentient on Tuesday February 18 2014, @03:14AM

    by Subsentient (1111) on Tuesday February 18 2014, @03:14AM (#1344) Homepage Journal

    Google must be stopped. Badly.

    --
    "It is no measure of health to be well adjusted to a profoundly sick society." -Jiddu Krishnamurti
    • (Score: 1) by Cyberdyne on Tuesday February 18 2014, @06:08PM

      by Cyberdyne (403) on Tuesday February 18 2014, @06:08PM (#1766)

      Stopped badly, or stopped effectively?