-
(单词翻译:双击或拖选)
This is FRESH AIR. I'm Terry Gross. One of the downsides of all the conveniences of online shopping and banking1, as well as social media and email is coming up with all of those darned passwords, and worse yet having to remember them. Many people use the same password for different sites, or store their multiple passwords right on their computers, leaving themselves vulnerable to hackers2. Our technology correspondent, Alexis Madrigal3, suggests a reasonable course for protecting ourselves online without too much effort.
ALEXIS MADRIGAL, BYLINE4: It's time I admitted something. Though I've written about the Internet for years my online security practices are not good. Despite constant warnings from knowledgeable5 friends, I persist in doing all the things with my passwords that you're not supposed to. I don't make them complicated enough, I reuse the same ones over and over. I don't change them very often and I keep a list of important ones in a file on my computer. Frankly6, it's shameful7.
This fall, though, I decided8 it was time to get serious. I made a resolution - I would come up with a system for dealing9 with my passwords. First, I had to figure out what I wanted to protect and email sits atop that list because if you have access to my inbox, you can probably gain access to everything else. The best way to secure an account, like Google's Gmail, is to turn on two-step verification. Basically you link your phone with your account and then when you login from a new computer, Google text messages a random10 six digit11 code to your phone that you have to enter along with your actual password. This means that even if your password fell into the wrong hands, without your phone, would-be attackers would be thwarted12.
Apple's data syncing service iCloud offers the same protection, as do prominent social media services like Twitter and Facebook. So I enabled two-step verification in those places too. My particular bank doesn't offer two-step - shame on them - but many do, and the waiting for the text message and then entering the code is a minor13 hassle. It's worth the peace of mind. But that's only the very top security tier. Some sites are important, but not that important. And you might not want to introduce that level of friction14 into using them. For this trench15, I decided to generate really lengthy16 passwords using a specialized17 piece of software called, logically, a password manager.
Three I've heard and read great things about are 1Password, Dashlane and LastPass. I chose to use 1Password because it's been around since 2006 and longevity18 seems like a good thing in the security industry. The key to a password manager is this - if you don't have to remember all the dozens of passwords yourself, then you can use really, really tough ones for each site you visit and it'll remember them all for you. The whole program is controlled by a master code, which they encourage you to make the length of a sentence and essentially19 uncrackable. Basically, you make a deal with yourself - remember one really, really long tough password in exchange for the software remembering the rest.
Now, I'm not going to make the picture rosier20 than it is. 1password is not the easiest software to use. You have to install the desktop21 program, then the browser22 extension and most likely an app on your phone. Then for every site you visit, you need to have it store that credential. Even more annoyingly, if you currently have weak passwords, you need to change those to something very difficult to guess. Then store that login in the software. Doing this over and over is quick but a hassle. For my 15-key sites, it took 22 minutes of concerted effort to complete. For other semi-important sites, I'm just dealing with them as I go.
I add a couple a day at most, so slowly my security hygiene23 is improving. But you know in some diets there are cheat days? I have cheat passwords. For sites that truly don't matter, where login is merely a formality, I have used and will continue to use the exact same easy-to- remember password. If someone hacks24 these accounts, nothing really bad can happen. I'd like to say that if you take all these steps you'll be forever safe from malicious25 forces, but that's not true.
In an effort to make customer service easier, many companies allow the security questions like where did you go to high school? - To stand in for your password itself. With our ever more Google-able identities and underground malicious services that traffic in Social Security numbers and other personal information, bad actors will continue to use this loophole to compromise accounts. But none of this actually sends me running from the web. All I really want is peace of mind that I did what was reasonable.
My attitude online is the same one I have off-line. Consider that we hand our credit cards to strangers every day and our private mail sits in our mailboxes untended. Theoretically we could take crazy precautions to prevent problems, but the odds26 are nothing horrible will happen, and people make that trade-off. Perhaps one day a fingerprint27 or Iris28 or facial scanner will completely replace all the numbers and letters that unlock our digital lives. But until then, a couple hours will go a long way towards making your data secure from criminals. Simple precautions will fend29 off the dumbest of them and nothing will stop the smartest.
点击收听单词发音
1 banking | |
n.银行业,银行学,金融业 | |
参考例句: |
|
|
2 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
3 madrigal | |
n.牧歌;(流行于16和17世纪无乐器伴奏的)合唱歌曲 | |
参考例句: |
|
|
4 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
5 knowledgeable | |
adj.知识渊博的;有见识的 | |
参考例句: |
|
|
6 frankly | |
adv.坦白地,直率地;坦率地说 | |
参考例句: |
|
|
7 shameful | |
adj.可耻的,不道德的 | |
参考例句: |
|
|
8 decided | |
adj.决定了的,坚决的;明显的,明确的 | |
参考例句: |
|
|
9 dealing | |
n.经商方法,待人态度 | |
参考例句: |
|
|
10 random | |
adj.随机的;任意的;n.偶然的(或随便的)行动 | |
参考例句: |
|
|
11 digit | |
n.零到九的阿拉伯数字,手指,脚趾 | |
参考例句: |
|
|
12 thwarted | |
阻挠( thwart的过去式和过去分词 ); 使受挫折; 挫败; 横过 | |
参考例句: |
|
|
13 minor | |
adj.较小(少)的,较次要的;n.辅修学科;vi.辅修 | |
参考例句: |
|
|
14 friction | |
n.摩擦,摩擦力 | |
参考例句: |
|
|
15 trench | |
n./v.(挖)沟,(挖)战壕 | |
参考例句: |
|
|
16 lengthy | |
adj.漫长的,冗长的 | |
参考例句: |
|
|
17 specialized | |
adj.专门的,专业化的 | |
参考例句: |
|
|
18 longevity | |
n.长命;长寿 | |
参考例句: |
|
|
19 essentially | |
adv.本质上,实质上,基本上 | |
参考例句: |
|
|
20 rosier | |
Rosieresite | |
参考例句: |
|
|
21 desktop | |
n.桌面管理系统程序;台式 | |
参考例句: |
|
|
22 browser | |
n.浏览者 | |
参考例句: |
|
|
23 hygiene | |
n.健康法,卫生学 (a.hygienic) | |
参考例句: |
|
|
24 hacks | |
黑客 | |
参考例句: |
|
|
25 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
26 odds | |
n.让步,机率,可能性,比率;胜败优劣之别 | |
参考例句: |
|
|
27 fingerprint | |
n.指纹;vt.取...的指纹 | |
参考例句: |
|
|
28 iris | |
n.虹膜,彩虹 | |
参考例句: |
|
|
29 fend | |
v.照料(自己),(自己)谋生,挡开,避开 | |
参考例句: |
|
|
30 silicon | |
n.硅(旧名矽) | |
参考例句: |
|
|
31 fusion | |
n.溶化;熔解;熔化状态,熔和;熔接 | |
参考例句: |
|
|