1,958 research outputs found

    "I have no idea what they're trying to accomplish:" Enthusiastic and Casual Signal Users' Understanding of Signal PINs

    Full text link
    We conducted an online study with n=235n = 235 Signal users on their understanding and usage of PINs in Signal. In our study, we observe a split in PIN management and composition strategies between users who can explain the purpose of the Signal PINs (56%; enthusiasts) and users who cannot (44%; casual users). Encouraging adoption of PINs by Signal appears quite successful: only 14% opted-out of setting a PIN entirely. Among those who did set a PIN, most enthusiasts had long, complex alphanumeric PINs generated by and saved in a password manager. Meanwhile more casual Signal users mostly relied on short numeric-only PINs. Our results suggest that better communication about the purpose of the Signal PIN could help more casual users understand the features PINs enable (such as that it is not simply a personal identification number). This communication could encourage a stronger security posture.Comment: To appear at Symposium on Usable Privacy and Security (SOUPS) 202

    Knock, Knock. Who's There? On the Security of LG's Knock Codes

    Full text link
    Knock Codes are a knowledge-based unlock authentication scheme used on LG smartphones where a user enters a code by tapping or "knocking" a sequence on a 2x2 grid. While a lesser used authentication method, as compared to PINs or Android patterns, there is likely a large number of Knock Code users; we estimate, 700,000--2,500,000 in the US alone. In this paper, we studied Knock Codes security asking participants to select codes on mobile devices in three settings: a control treatment, a blocklist treatment, and a treatment with a larger, 2x3 grid. We find that Knock Codes are significantly weaker than other deployed authentication, e.g., PINs or Android patterns. In a simulated attacker setting, 2x3 grids offered no additional security, but blocklisting was more beneficial, making Knock Codes' security similar to Android patterns. Participants expressed positive perceptions of Knock Codes, but usability was challenged. SUS values were "marginal" or "ok" across treatments. Based on these findings, we recommend deploying blacklists for selecting a Knock Code because it improves security but has limited impact on usability perceptions

    Measurement of the mass difference and the binding energy of the hypertriton and antihypertriton

    Full text link
    According to the CPT theorem, which states that the combined operation of charge conjugation, parity transformation and time reversal must be conserved, particles and their antiparticles should have the same mass and lifetime but opposite charge and magnetic moment. Here, we test CPT symmetry in a nucleus containing a strange quark, more specifically in the hypertriton. This hypernucleus is the lightest one yet discovered and consists of a proton, a neutron, and a Λ\Lambda hyperon. With data recorded by the STAR detector{\cite{TPC,HFT,TOF}} at the Relativistic Heavy Ion Collider, we measure the Λ\Lambda hyperon binding energy BΛB_{\Lambda} for the hypertriton, and find that it differs from the widely used value{\cite{B_1973}} and from predictions{\cite{2019_weak, 1995_weak, 2002_weak, 2014_weak}}, where the hypertriton is treated as a weakly bound system. Our results place stringent constraints on the hyperon-nucleon interaction{\cite{Hammer2002, STAR-antiH3L}}, and have implications for understanding neutron star interiors, where strange matter may be present{\cite{Chatterjee2016}}. A precise comparison of the masses of the hypertriton and the antihypertriton allows us to test CPT symmetry in a nucleus with strangeness for the first time, and we observe no deviation from the expected exact symmetry

    Effective Rheology of Bubbles Moving in a Capillary Tube

    Full text link
    We calculate the average volumetric flux versus pressure drop of bubbles moving in a single capillary tube with varying diameter, finding a square-root relation from mapping the flow equations onto that of a driven overdamped pendulum. The calculation is based on a derivation of the equation of motion of a bubble train from considering the capillary forces and the entropy production associated with the viscous flow. We also calculate the configurational probability of the positions of the bubbles.Comment: 4 pages, 1 figur
    corecore