About password security and credential stuffing
Common Falsehoods About Password Security and Credential Stuffing
TechCrunch published an article that gives class-action lawyers suing 23andMe a mouthpiece to editorialize about password security practices, masquerading as a news article. The upshot of the ~article~ editorial is this:
- A large number of 23andMe’s customers were subject to a credential stuffing attack.
- Design choices in 23andMe’s site allowed other customer data to be exposed via accounts compromised in the credential stuffing attack.
- 23andMe’s mitigations for credential stuffing attacks were inadequate.
- 23andMe should be held liable for this.
I want to focus here on the third point: credential stuffing attack mitigations. I’ve worked quite a bit on analyzing large credential stuffing attacks and recommending mitigations for them. I also served as a technical escalation point for customers who had a wide variety of strongly held false beliefs about password security credential stuffing mitigation. In reading various social media responses the 23andMe case, I see all these false beliefs turning up again. Let’s have a look at some.
False: Rate limiting login attempts is a great mitigation
The first question we need to answer here is: what do you mean by rate limiting? Usually there are two main rate limits that people Continue reading

