UX of Passwords | Refresh Seattle | Claire Carlson

T
UX of Passwords
I’m Claire
from Blink.
Venmo
1.  Current password UX
2.  How it can be improved
3.  The future of passwords
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
What if your identity
was stolen?
Let me tell
you about
Steve.
1. Freeze bank accounts
2. Open new accounts
3. Set fraud alert on SS#
4. Repayment pending an investigation
5. Reset auto-withdrawal accounts
What have we heard
makes passwords secure?
8+ characters
1+ numbers
1+ symbols
Camp 1	
   Camp 2	
  
A really, really
long string
Why two camps?
My Hypothesis:	
  
Camp 1	
   Camp 2	
  
Humans are not good
at being random.
1	
  	
  	
  	
  123456	
  (Unchanged	
  from	
  2013)	
  	
  
2	
  	
  	
  	
  password	
  (Unchanged)	
  	
  
3	
  	
  	
  	
  12345	
  (Up	
  17)	
  	
  
4	
  	
  	
  	
  12345678	
  (Down	
  1)	
  	
  
5	
  	
  	
  	
  qwerty	
  (Down	
  1)	
  	
  
6	
  	
  	
  	
  1234567890	
  (Unchanged)	
  	
  
7	
  	
  	
  	
  1234	
  (Up	
  9)	
  	
  
8	
  	
  	
  	
  baseball	
  (New)	
  	
  
9	
  	
  	
  	
  dragon	
  (New)	
  	
  
10	
  	
  	
  football	
  (New)	
  	
  
11	
  	
  	
  1234567	
  (Down	
  4)	
  	
  
12	
  	
  	
  monkey	
  (Up	
  5)	
  	
  
13  letmein	
  (Up	
  1)	
  	
  
14	
  	
  	
  	
  abc123	
  (Down	
  9)	
  	
  
15	
  	
  	
  	
  111111	
  (Down	
  8)	
  	
  
16	
  	
  	
  	
  mustang	
  (New)	
  	
  
17	
  	
  	
  	
  access	
  (New)	
  	
  
18	
  	
  	
  	
  shadow	
  (Unchanged)	
  	
  
19	
  	
  	
  	
  master	
  (New)	
  	
  
20	
  	
  	
  	
  michael	
  (New)	
  	
  
21	
  	
  	
  	
  superman	
  (New)	
  	
  
22	
  	
  	
  	
  696969	
  (New)	
  	
  
23	
  	
  	
  	
  123123	
  (Down	
  12)	
  	
  
24	
  	
  	
  	
  batman	
  (New)	
  	
  
25	
  	
  	
  	
  trustno1	
  (Down	
  1)	
  
Most Common Passwords:	
  
hGp://www.splashdata.com/	
  	
  
Do people feel secure
online?
300 People	
   4 Questions	
  Across the U.S.	
  
I asked…
Knowledge of Hacks
Password Habits
Reasons for Changing Passwords
So what?
Passwords are
broken!
We are responsible for
a better password UX.
Ideas for improving
current password UX.
Poor	
  Security	
  
&	
  Good	
  UX	
  
Good	
  Security	
  
&	
  Poor	
  UX	
  
1. Make
security a
priority.
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
2. Make
“Change
Password”
prominent.
Changing iCloud Password
1Password
 Dashlane
3. Remind
users to
change their
password
every 6
months.
4. Provide 
2-step
verification.
“GeQng	
  into	
  Amazon	
  let	
  my	
  
hackers	
  get	
  into	
  my	
  Apple	
  ID	
  
account,	
  which	
  helped	
  them	
  
get	
  into	
  Gmail,	
  which	
  gave	
  
them	
  access	
  to	
  TwiGer.	
  Had	
  I	
  
used	
  two-­‐factor	
  
authenZcaZon	
  for	
  my	
  Google	
  
account	
  ,	
  it’s	
  possible	
  that	
  
none	
  of	
  this	
  would	
  have	
  
happened.”	
  	
  
-­‐	
  MaG	
  Honan,	
  WIRED	
  
“he	
  very	
  four	
  digits	
  that	
  
Amazon	
  considers	
  
unimportant	
  enough	
  to	
  
display	
  in	
  the	
  clear	
  on	
  the	
  
web	
  are	
  precisely	
  the	
  same	
  
ones	
  that	
  Apple	
  considers	
  
secure	
  enough	
  to	
  perform	
  
idenZty	
  verificaZon.”	
  	
  
-­‐	
  MaG	
  Honan,	
  WIRED	
  
Digits
Google
Security Key
5. Incentivize good
security habits.
6. Advise users to
create long strings,
not random strings.
hGp://xkcd.com/936/	
  	
  
hGp://xkcd.com/936/	
  	
  
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
7. Show requirements
all the time.
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
8. Show password
characters.
“If people attempt to
recover a password
while checking out on a
e-commerce site, 75%
won’t complete their
purchase.” 
	
  
–	
  Jared	
  Spool	
  
“Masking passwords
doesn't even increase
security, but it does cost
you business due to
login failures.”

–	
  Nielsen	
  Norman	
  Group	
  
hGp://uxmovement.com/forms/why-­‐password-­‐masking-­‐can-­‐hurt-­‐your-­‐sign-­‐up-­‐form/	
  	
  
hGp://www.lukew.com/ff/entry.asp?1941	
  	
  
9. Timeout after five failed
login attempts.
10. Ask security questions
when a user calls customer
service and when a user logs
in from a new device or
network.
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
What does the future of
passwords look like?
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
UX of Passwords  |  Refresh Seattle  |  Claire Carlson
Nobody is 
hack-proof.
Don’t let
this happen
to your
users.
Where do you see
authentication
heading?
Thank you!
@TheNextUX
1 of 66

Recommended

Google Penguin and Panda - Algorithm explanation by
Google Penguin and Panda - Algorithm explanationGoogle Penguin and Panda - Algorithm explanation
Google Penguin and Panda - Algorithm explanationWoptimo
4.9K views19 slides
Los planetas by
Los planetasLos planetas
Los planetasMartha Sofia Castillo Mauricio
145 views11 slides
Los planetas by
Los planetasLos planetas
Los planetasMartha Sofia Castillo Mauricio
114 views11 slides
Anatomy of a WordPress Hack by
Anatomy of a WordPress HackAnatomy of a WordPress Hack
Anatomy of a WordPress Hackjessepollak
2.5K views111 slides
Culture and Consciousness: Designing For Social Justice by
Culture and Consciousness: Designing For Social JusticeCulture and Consciousness: Designing For Social Justice
Culture and Consciousness: Designing For Social JusticeEleanor—Jayne Browne
2K views93 slides
The life of breached data and the attack lifecycle by
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
399 views74 slides

More Related Content

Similar to UX of Passwords | Refresh Seattle | Claire Carlson

Lesson Presentation Powerful Passwords.pptx by
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxAllanGuevarra1
10 views20 slides
The Life of Breached Data & The Dark Side of Security by
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityJarrod Overson
935 views82 slides
Future of Identity, Data, and Wearable Security by
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
1.4K views20 slides
Beyond The Padlock: New Ideas in Browser Security UI by
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UImozilla.presentations
635 views67 slides
Hushcon 2016 Keynote: Test for Echo by
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoDeja vu Security
271 views59 slides
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ... by
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
407 views67 slides

Similar to UX of Passwords | Refresh Seattle | Claire Carlson(20)

Lesson Presentation Powerful Passwords.pptx by AllanGuevarra1
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptx
AllanGuevarra110 views
The Life of Breached Data & The Dark Side of Security by Jarrod Overson
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
Jarrod Overson935 views
Future of Identity, Data, and Wearable Security by Jonathan LeBlanc
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
Jonathan LeBlanc1.4K views
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ... by adamdeja
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja407 views
Online security: How to stay safe by Duc Le
Online security: How to stay safeOnline security: How to stay safe
Online security: How to stay safe
Duc Le718 views
Os Nightingale by oscon2007
Os NightingaleOs Nightingale
Os Nightingale
oscon2007368 views
Human is an amateur; the monkey is an expert. How to stop trying to secure yo... by Vlad Styran
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Vlad Styran319 views
Hardware and the commerce revolution by Cristiano Betta
Hardware and the commerce revolutionHardware and the commerce revolution
Hardware and the commerce revolution
Cristiano Betta670 views
MacMAD MacOS Security by bos45
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Security
bos451.1K views
Password - Strong and Memorable Passwords by N. M. Ali Hayder
Password - Strong and Memorable PasswordsPassword - Strong and Memorable Passwords
Password - Strong and Memorable Passwords
N. M. Ali Hayder237 views
Passwords by EvaldasKHF
Passwords Passwords
Passwords
EvaldasKHF252 views
Sept 2014 cloud security presentation by Joan Dembowski
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
Joan Dembowski333 views
Passwords: the weakest link in WordPress security by jessepollak
Passwords: the weakest link in WordPress securityPasswords: the weakest link in WordPress security
Passwords: the weakest link in WordPress security
jessepollak498 views

Recently uploaded

Sudden Deafness Design Document by
Sudden Deafness Design DocumentSudden Deafness Design Document
Sudden Deafness Design Documentwyfangherman
50 views19 slides
Cocktail Merchandise by
Cocktail MerchandiseCocktail Merchandise
Cocktail Merchandisenyhapedraza
6 views20 slides
Essay 29.docx by
Essay 29.docxEssay 29.docx
Essay 29.docxOrlySiquihua
5 views1 slide
Anti-Cancer Drugs-Medicinal Chemistry by
Anti-Cancer Drugs-Medicinal ChemistryAnti-Cancer Drugs-Medicinal Chemistry
Anti-Cancer Drugs-Medicinal ChemistryNarminHamaaminHussen
9 views41 slides
Benzodiazepines--Medicinal Chemistry by
Benzodiazepines--Medicinal ChemistryBenzodiazepines--Medicinal Chemistry
Benzodiazepines--Medicinal ChemistryNarminHamaaminHussen
7 views32 slides
New Icon Presentation.pdf by
New Icon Presentation.pdfNew Icon Presentation.pdf
New Icon Presentation.pdfsydneyjrichardson
22 views5 slides

Recently uploaded(20)

Sudden Deafness Design Document by wyfangherman
Sudden Deafness Design DocumentSudden Deafness Design Document
Sudden Deafness Design Document
wyfangherman50 views
DR Portfolio.pptx by robertsd2
DR Portfolio.pptxDR Portfolio.pptx
DR Portfolio.pptx
robertsd210 views
The Report is Dead, Long Live the Report ! Communicating Usability Research F... by Centralis
The Report is Dead, Long Live the Report ! Communicating Usability Research F...The Report is Dead, Long Live the Report ! Communicating Usability Research F...
The Report is Dead, Long Live the Report ! Communicating Usability Research F...
Centralis5 views
Using Experiential Design to Understand the Future of AI & Immersive Storytel... by Kent Bye
Using Experiential Design to Understand the Future of AI & Immersive Storytel...Using Experiential Design to Understand the Future of AI & Immersive Storytel...
Using Experiential Design to Understand the Future of AI & Immersive Storytel...
Kent Bye10 views
IEC 600068-2-39 ENVIROMENT TESTING COMBINED TEMPERATURE LOW HUMIDTY.pdf by NirmalanGanapathy1
IEC 600068-2-39 ENVIROMENT TESTING COMBINED TEMPERATURE LOW HUMIDTY.pdfIEC 600068-2-39 ENVIROMENT TESTING COMBINED TEMPERATURE LOW HUMIDTY.pdf
IEC 600068-2-39 ENVIROMENT TESTING COMBINED TEMPERATURE LOW HUMIDTY.pdf
Business X Design - People, Planet & Product by Cyber-Duck
Business X Design - People, Planet & ProductBusiness X Design - People, Planet & Product
Business X Design - People, Planet & Product
Cyber-Duck19 views
217 Drive - All on upper.pptx by vidstor282
217 Drive - All on upper.pptx217 Drive - All on upper.pptx
217 Drive - All on upper.pptx
vidstor28216 views

UX of Passwords | Refresh Seattle | Claire Carlson