use is pretty impressive. (I don't know how it varies around the world
with different instances of HSBC.)
1. They chose the password, not me. (So not duplicated elsewhere, at
least not initially.) Short, alpha-numeric.
allow pasting, I used to use X11 middle-click pasting but one day they
decided I was a specific piece of Windows malware and locked me out
until I had my computer professionally cleaned. I managed to talk them
out of that for my Linux machine--but I don't middle click any more. (I
actually ended up talking to someone pretty real.) They are watching
their attacks, maintaining a security model on each customer.
4. They want the answer to a security question (effectively a password I
5. They want their password--but only a few positions, they show a form,
graying out boxes for positions they are not interested in.
In their model they are keeping track of when they have used which
character positions (when a keyboard sniffer might have discovered a
position). They seem to settle on the same character positions for a
long time, until something interesting happens (such as logging in with
a smart phone app), then they shift them. I bet their HTML doesn't
obviously reveal which positions they are requesting, to make the
They are being pretty clever to make up for terribly endpoint security.
This entry was originally posted at http://beldmit.dreamwidth.org/406780.html. Your comment? ( comments)