Feeds

Masked passwords must go

'Shoulder surfing is largely a phantom problem'

Security for virtualized datacentres

Websites should stop masking passwords as users type because it does not improve security and makes websites harder to use, according to two of the technology world's leading thinkers.

Usability expert Jakob Nielsen and security expert Bruce Schneier both think websites should stop blanking out passwords as users type them in. They say the practice inconveniences users and delivers no security benefits.

Most websites that require passwords allow a user to see the login name as it is typed in but replace the password with dots or asterisks as it is typed, so that the password cannot be viewed either by another person looking at the screen or by the user.

"It's time to show most passwords in clear text as users type them," said Nielsen in a post on his website. "Providing feedback and visualizing the system's status have always been among the most basic usability principles. Showing undifferentiated bullets while users enter complex codes definitely fails to comply."

Nielsen is the web's most famous usability guru and campaigns for content and websites to conform to technical standards to be usable and accessible for all users, including disabled users using assistive technologies.

Schneier, a renowned IT security expert, echoed Nielsen's concerns, and supported Nielsen's assertion that password masking does nothing to improve security.

"Password masking has annoyed me for years," Schneier told OUT-LAW.COM. "Shoulder surfing is largely a phantom problem, and people know to be alert when others are nearby, but mistyping a long password happens all the time."

Double degradation

Nielsen said that research had shown that password masking causes problems for users. "Password masking has proven to be a particularly nasty usability problem in our testing of mobile devices, where typing is difficult and typos are common. But the problem exists for desktop users as well," he said.

Preventing users from seeing the passwords they type in causes two problems, according to Nielsen. "Users make more errors when they can't see what they're typing while filling in a form. They therefore feel less confident. This double degradation of the user experience means that people are more likely to give up and never log in to your site at all, leading to lost business," he said.

"The more uncertain users feel about typing passwords, the more likely they are to (a) employ overly simple passwords and/or (b) copy-paste passwords from a file on their computer. Both behaviors lead to a true loss of security," he said.

Schneier agreed that masking passwords was likely to result in a weakening of security. "I'm sure people choose shorter and easier to type password when their typing is masked, resulting in less security overall," he said.

Nielsen said that sites usually blank out type-in passwords out of force of habit rather than reason. "Password masking has become common for no reasons other than (a) it's easy to do, and (b) it was the default in the web's early days," he said.

He acknowledged that shoulder surfing is a risk in some environments, such as internet cafés. "It's therefore worth offering them a checkbox to have their passwords masked; for high-risk applications, such as bank accounts, you might even check this box by default," he suggests. "In cases where there's a tension between security and usability, sometimes security should win."

See also
Nielsen's Alertbox on password masking
Bruce Schneier's blog

Copyright © 2009, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.