A:
This is a poor solution to the problem.
The thinking is that we can release a little information. It’s small enough to be safe, but large enough to confirm the passphrase.
But this approach is flawed because:
If the bank will accept the first initial of a last name in place of the complete last name, then an Evil Operator who gets the first initial will now have enough to steal the customer’s identity.
On the other hand, if the first initial is insufficient to steal the customer’s identity, by definition the bank will not accept it either.
A:
Because the site is very dumb and transparent. It performs one simple task and then forgets what it just did.
When the passphrases or secret data is entered, the site doesn’t know if it just received a bank account password, the military’s nuclear launch code, or a random 10-year old’s favorite breakfast cereal. The site will receive many inquiries continuously and the data is meaningless out of context.
A: Are you kidding me?! Have you been reading any of this? Our objective is to confirm a match without sharing the secret. The paper method reveals the secret. In fact, an Evil Operator can write nonsense or leave his paper blank and get the secret code when the other user turns over his paper.
A:
This can sometimes work.
If the data string is a strong, random password, such as a4vz}9{79AG6MD then using the hash method is fine.
However, if the secret phrase is a last name, for example, this is a bad method. The flaw in this method is that an Evil Agent can just hash 100, or 1,000 or 1,000,000 last names and compare that value to your hash value to see which one matches.
You actually can use a hashing function in conjunction with this site. The two users could first independently hash the passwords and then run the hashes through the site. This way, our site does not see the secret phrase, just the hashed phrase. It’s not necessary because, again, our site receives lots of data inputs and no context. The inputs could be from bots talking to each other or anyone. We have no idea and we don’t ask. And then we delete the data. But have at it, hash your phrase before you enter it, it makes no difference to us.
A:
To protect the User.
A communication app on this site would be like putting bleach in the refrigerator next to the milk--it makes a mistake more likely. We don’t want anyone to accidentally put their secret phrase in the communication app and send it to User B. We are looking out for you.
A: Yes, they could. But in this case, the Evil Agent could likely have tried both possibilities anyway. This case suggests significant breaches took place earlier. Don’t blame us.
A: Possibly. But then, they could do that without our site, too. An Evil Operator could tell a User I know your mother’s name and address and social security number so I am clearly legitimate, please can you tell us your password now? I’ll bet that sometimes works, unfortunately. But, as in the previous FAQ, that problem didn’t start with our site.
A: Good question. If you are concerned about this, it would be better if YOU go to checkpw.com and have User B scan your code. Or you could both go to checkpw.com and then one of you could enter the other's session code. We can't think of a way to break the security if you do either of these. But if you are scanning User B's QR code, make sure that the address your web browser wishes to open is actually checkpw.com followed by a session code. Then you're good.
A: Right now we don't. If it takes off, maybe we'll put some ads on the bottom of the screen, or sell the movie rights, maybe get a book deal...
A: No secret codes. Zero. If you are a Reuters or AP reporter and want to do a story on this site, we will be happy to give you all the coding, change logs, and all communications between the members of our team so you can feel confident that this never happened.
A: Please tell us about it. We looked and found nothing like CheckPW.com. We even paid someone to do research in three languages and he couldn’t find anything like it either. But let us know what you have in mind! Use the contact app on this site to get in touch.