1,958 research outputs found
"I have no idea what they're trying to accomplish:" Enthusiastic and Casual Signal Users' Understanding of Signal PINs
We conducted an online study with Signal users on their
understanding and usage of PINs in Signal. In our study, we observe a split in
PIN management and composition strategies between users who can explain the
purpose of the Signal PINs (56%; enthusiasts) and users who cannot (44%; casual
users). Encouraging adoption of PINs by Signal appears quite successful: only
14% opted-out of setting a PIN entirely. Among those who did set a PIN, most
enthusiasts had long, complex alphanumeric PINs generated by and saved in a
password manager. Meanwhile more casual Signal users mostly relied on short
numeric-only PINs. Our results suggest that better communication about the
purpose of the Signal PIN could help more casual users understand the features
PINs enable (such as that it is not simply a personal identification number).
This communication could encourage a stronger security posture.Comment: To appear at Symposium on Usable Privacy and Security (SOUPS) 202
Knock, Knock. Who's There? On the Security of LG's Knock Codes
Knock Codes are a knowledge-based unlock authentication scheme used on LG
smartphones where a user enters a code by tapping or "knocking" a sequence on a
2x2 grid. While a lesser used authentication method, as compared to PINs or
Android patterns, there is likely a large number of Knock Code users; we
estimate, 700,000--2,500,000 in the US alone. In this paper, we studied Knock
Codes security asking participants to select codes on mobile devices in three
settings: a control treatment, a blocklist treatment, and a treatment with a
larger, 2x3 grid. We find that Knock Codes are significantly weaker than other
deployed authentication, e.g., PINs or Android patterns. In a simulated
attacker setting, 2x3 grids offered no additional security, but blocklisting
was more beneficial, making Knock Codes' security similar to Android patterns.
Participants expressed positive perceptions of Knock Codes, but usability was
challenged. SUS values were "marginal" or "ok" across treatments. Based on
these findings, we recommend deploying blacklists for selecting a Knock Code
because it improves security but has limited impact on usability perceptions
Measurement of the mass difference and the binding energy of the hypertriton and antihypertriton
According to the CPT theorem, which states that the combined operation of
charge conjugation, parity transformation and time reversal must be conserved,
particles and their antiparticles should have the same mass and lifetime but
opposite charge and magnetic moment. Here, we test CPT symmetry in a nucleus
containing a strange quark, more specifically in the hypertriton. This
hypernucleus is the lightest one yet discovered and consists of a proton, a
neutron, and a hyperon. With data recorded by the STAR
detector{\cite{TPC,HFT,TOF}} at the Relativistic Heavy Ion Collider, we measure
the hyperon binding energy for the hypertriton, and
find that it differs from the widely used value{\cite{B_1973}} and from
predictions{\cite{2019_weak, 1995_weak, 2002_weak, 2014_weak}}, where the
hypertriton is treated as a weakly bound system. Our results place stringent
constraints on the hyperon-nucleon interaction{\cite{Hammer2002,
STAR-antiH3L}}, and have implications for understanding neutron star interiors,
where strange matter may be present{\cite{Chatterjee2016}}. A precise
comparison of the masses of the hypertriton and the antihypertriton allows us
to test CPT symmetry in a nucleus with strangeness for the first time, and we
observe no deviation from the expected exact symmetry
Effective Rheology of Bubbles Moving in a Capillary Tube
We calculate the average volumetric flux versus pressure drop of bubbles
moving in a single capillary tube with varying diameter, finding a square-root
relation from mapping the flow equations onto that of a driven overdamped
pendulum. The calculation is based on a derivation of the equation of motion of
a bubble train from considering the capillary forces and the entropy production
associated with the viscous flow. We also calculate the configurational
probability of the positions of the bubbles.Comment: 4 pages, 1 figur
- …
