Startup Replacing Passwords With Patterns (Shayype)

Author: Brian Rhodes, Published on Jun 28, 2017

This startup, Shayype, aims to eliminate passwords, replacing them with patterns.

Problems with passwords are clear, as simple passwords, re-used passwords, brute force attacks on passwords, etc. create significant problems.

But can 'patterns' fix this problem?

Inside this report, we share our test findings on Shayype's approach.

**** *******,*******, **** ** ********* *********, ********* **** **** ********.

******** **** ********* *** *****, ** ****** *********, **-**** *********, brute ***** ******* ** *********, ***. ****** *********** ********.

*** *** '********' *** **** *******?

****** **** ******, ** ***** *** **** ******** ** *******'* approach.

[***************]

Uses ********, *** *******

****** **** * ***** ******** ** ***,*********** * ****** ** ******** ******* **** ********** ** ***** on *** *******. ** ***** *********, *** **** ***** ** the ******** ******* ********* *** ***** ** * ******** ******* they **** ********** *******.

*** ********* ***** ***** ******* ********* *** ***** ** *** specific ***** ********* * ******* ********:

*** *** ** *** *******'* ********, ** **** ****** ********* will *** ******** ********* *******. *** ********* ********* / ****** numbers ***** **** ********* **** *** ****** ** *****:

******* ****** **** *** ****** ****** '*.* ******* ******** ******** in *** *** ****** (** *** *** *** **** *****)', and **** ** '**** ** ******* ***** *** **** *******, your *********** ** ******* *** ****-**** **** ** *********', ********* in * ****** ********, ****** *** '****' ******* ** * password.

********** * *******, ** ********** * *** *** **** ******, require ******* ** ******** ******* ** ***** **. ** *** case ** *******'* **** *******, **** **** * ***** **** where ***** ***** * *** *******.

Overview *****

** *** ***** *****, ** **** *** ******* ***** *** how ** ** ********* **** ******** ***** **************:

Claimed **********

******* ****** **** ******* *** **** ***** ****** ** ****** and ********** ******** ** ******* *** *** **** ** *****, their ****** ** **** ******. ** ******** ** *** ******* defining *** ********, ******* ****** ******* ***** ********** **** ******** passwords, *********:

  • ** ****** '*****': **** *******, ***** ** *** **** ** ***** *** matrix, ** ***** ******* ******* ** ***** * ****, *** only *** *** ******* **** ***** **** *** ***** ** using * ******** ******. **** ** ********* **** *********** ******* where **** ****, ********* *** ** **** ******** ******* *** become ****** ** ****, '*******' ********* ******* ***** ******* *** used *** ***** ******. *******'* *** ****** *** * **** of ******* ******* ** *** **** **** ** *** **** someone ******** ** **** ** *** ******* ***** ****.
  • ****-**-*****: ** *** ********* ****** *** ******* * - *, each ***** ** ******** ******** ***** ** *** ******, ******* complicating *******. ** ******* **** * **** ***** *******, ** could *********** ** ******* ********* ********.
  • ******* ************: **** ** ***** ****** ****** ********, **** '*- ******' or '**** *******', *** ***** *** ******* ** ******* **** also ** *****, ** ****** **** *****-**-****, ** ******* * gap, ** ******** *** **** **** ***** **** ** *** obscurity ** * ******** ****** ** ******. ********, *** ******* or ****** ********* *** ******* ** **********, ** *** ****** they ******* ** **** ******** ** * ******** ******* *** indicated *********.

Online ****

*** ******* ***** *'***** ** *******' ******* ***** *******. **** ***** ****** ***** *********, ******* ******* an ******* **** ********** *** *** *** *** ******** *** ********** *** *** *** ****** ***** **********.

***********

*** *** ******* ********, *******'* ****** **** **** *********, ********** for *** ******** ******** ******. *** *** **** *******:

  • ** ******* ***: ******* ** ***** ** **** **** * **** ***** web-hosted **********, *** *** *** *** **** ******* ** ******** in ** *** ********. ***** * ********** ****, *** ******** lacks *** ******* *** *** ******* ***** ********** ** ********** use *** **********.
  • ******** ***** ********: ***** **** ********* ** ******* **** ****, ******* ******** can ***** ** ********* ** ******** *** *** ***** ** unauthorized *****. **** ***** **** ************* ******** ** ***** *** be *******, *** ********* ********** ***** *** ***** ***** ***** codes.
  • *****-***** ****: ******* ** ***** ********* ** *** **-********** **** ******* physical ******** ** *************,*** **** ********** ** ********* *** ***************** *** ***** ********* ********* ******** **** *******, *****, ***, *** *-******. *******, ******* *** **** *********** ********** ******** *** ******** to ****** ** ********** *** ******** ******* ******* ******.

Vote / ****

Versus ************

*** ******** ******** ************, ******* ***** ** ** *********** *** for ******** ****** ******* ** ******* *** *** ** ****** readers. ****** **** ******* ******** **** **** *** ******* ** memorized ** ******** ** ************ *****, ******* ***** ******* '*********** security' ** ******* ** ***** * ********* ****** ** ********** valid *****.

**** '**** ********' ******* **** ********* ***** ******* *** ****** between **** ***** **** ****** ***** ****** **** ********, ** the ***** ** *** **** **** *** ****** *** **** the ********* *** ******* ******. ****** ***** ** ************ **** like *****, ** ***** ** ******** ******* ****: ***********:

******* *********** ******** *** ******** ** **** ** *** ***** fixed ********* ** ***, ******* ************* * *********** **** **** of ****** **********.

Still ***** ** ******

** *** ********* *** *******'* *******-***** ****, *** *** ****** and ******* ***** ** *********** ** *** ** **** **** effectively *** ********, ***** *** **** ** ***** ****** *** this ********.

Comments (16)

* **** **** * ******** ******* ********** *** ********* ******* to ****. * ******* ** *** ********. *** ********** *** sold ** *******, ***** ** *** **** ** *******. * wonder ** ***** ****** **** *** ****. :)

****'* * **** ****!

**** ** * ***** *********'* ********:

*** ************ **** *** ******. *'** *** ******* ** ******* on *****/***/** ***** ****** ** *********.

* ******* ******** *******, *** ** *** ********** ** *******, to *** ***** *** ************* ******* ** *** *******'* ********. His ********:

"* *** *** ********** ** ******** (**************://**.*********.***/****/********) **** ******* *****, *** * ***** ** ** * jobbing ********** ** ** **** ***********.

******* ******* ** * *** **** ********* *******, ******** *********** for ******** ** ***** *** *** ******** ** * **** security *******.

***’** **** ****** **** *** **** **** **** * ************* Mike **** ********** ******** ******* ** ****** * ****** *** records *** **** ******* *** *** ********** ***** ** *** 2-3 ***** ***** ******* **** *** *** ****’* *******.

*** **** ****** **’** ******* * **** ******** ******* (******* HSS) ***** *****’* *** *** ******’* ********, ********** * ****** knowing ***** ********** **** **** ***** **. **** ***** ** our **** **** ** ******** ***** **** ** ******/**** *** login ********* ******* ******** ***** – ***** ** ****** ****’** unlikely ** **."

***********, ******* **** **** *******'* ******** ******/ *** ****** ****** touchpad *** ******** ********* ****** (*, *** * ******) **** observation **** ********* **** *** ******* *******.

*** **** ****** **’** ******* * **** ******** ******* (******* HSS) ***** *****’* *** *** ******’* ********, ********** * ****** knowing ***** ********** **** **** ***** **.

***** *** ****** *********** ********* ******* *** ** ********** ******* to **** *** ****,

*** **** ** ******** **.

*******, ** ******* ** *** ********* ** ** ****** ******* application;

** ** ****** ******* *** ******** ****** ***** *** *** using * ****** ******, * ***** ****** **** *** ***** is ******, ***** **** ***** **** ********** ******* ***** *******, if * ********** ** ********.

***** **** ********* ** ******* **** ****, ******* ******** *** still ** ********* ** ******** *** *** ***** ** ************ users.

1 * ** ** ** ** may not need much explaining :)

**** ***** ** **** *********** *** * ****** ******** ****** to ***** **** ***, *** * ********** ****** ***** ***** video ** *** *******, *** *** ***** ******* *** **** be ********** ** **** ** *** ******* ******* *** *** entered *** *** ********.

***** **'* ******** ** ** **** ** *** **** ** video ****** ** * ********* ****** ******** *** ***** ** view *** * ****-******** *** *** ** ***** **** * guess **'* ****** **** ** ********** ****** ***********.

*** **'* **** ********** **** ********* ** ***** *** ******* with * ****** ** * ***. ***** ************* ***** ***** just *** ** ** **. * ***** ******** ** * sticky **** *** *** *********** *** ******.

*** *** ****** *** ****** ******* ********* *** ******** *** an ***** ****. ***** ********* **** *** ***** **** **, and **'* ****, ** **** *****'* ****** ****** **. ** should ** ********.

** *** **** ** ******* ******* ** ****** ******* ***********, use **** ****** **************, **** **** ****, *** ****** ******* policy ******* *******.

*** *********** ************** ****** **** ******** ***** *** *********** ** stolen ****** ***********, *** ********* ****** ***** **** **** **** back **** ****** **** ***** ************ ****** ** *** ***** who *** ***** ** *** ** ** ****** **** ********** measures *** ** *****.

*****, *** ** **** ** ******* ********* ** *** ****** so ** ********** ** ******** ****** ******* ** **, *** it ** *** ****** ************* **** ******** **** **** ** already ********* ** *** ******.

**** **?

*** * ********** ****** ***** ***** ***** ** *** *******, and *** ***** ******* *** **** ** ********** ** **** as *** ******* ******* *** *** ******* *** *** ********.

**, **** ***** *** ** ****** *** ** ***duplicate ****** in the grid. For instance, Brian's 411022 one-time password yields many thousand compatible patterns, not just his valid one of four corners and two center, so you would not be able to try them all before lock-up.

** *** ***** ****, ** *** **** **** ** ******** catch ***** **several ****** ** *** **** ******, each with their own key grid, you could eventually determine the pattern, by deduction.

***** * ***** ***** **** *** **** *********, *** ** would ** ********* **** **** ******* **** ***** ** ********** with **,*** ********, ~*^*. **** ******* ***** ***** ******* **,***. Any ******** *** ** *** ******** **** *** ******** ******** would ** *********, ***** *** ******* ******* ***** **** ** be ******* ** *** ****.

***** *** ****** **** ***** ** **** *** ****. ***** you ***** ** ** **** **** * ******* ** *****, or ***** **** ** ********* **** ***** **** ** **** harder, *** *** ***** ********** ** *** ******.

****** ***'** ****** ***** :)

***, ***'** *****. ** *******! *****, **** ** ****** **** the **** ****** **** ********* *** ** ***** ** ** it *** ** ********** ********* **** ******** **********. *** ** you *** *** **** ** *** **** ** ********* ******** features, *** *** * *****.

*** * ***** ** ** ******** * **** ***** ** the *** ** ******* *** *******? ** ***** **** *** I **** *** ******* *** ** *****'* ****** **** *** ransom ******* ***.

*** ****** **** ******* **** ********* *** *** ****** ******* to ********* * ****** *******.

**** ****** ******* ******** *****, ** **** * ******* ******* would ******* ******** ************ ** ********** * *******.

*'** *** ******* *** *********, *** * ****** ******* ******* will *** ****** ******* *** *******.

**'* ******** *** *******, *** *** ****** *******

*** **** ***'* **** *** *******, **** **** **** *** numbers **** **** ********** ** **** ********, **** *** ** which ** *** *** **** *** **** *** **.

** *** **** ** **** ***** ****** ** *** **** displayed **** ****** **** ****** ***** ****, *** ***** ***** are ** ******* ********, **** ***** *** ****** *-*, **** a **** ***** ******* ** * *******.

** ** * **** ** ******* *** * **** **** that *** *** ***** *** ****** ** *** *** ****** layout **** ********* *******, *** **** ** ***** ** *** on *** **** ****** *** **** * ***** ** **** to **** **** ******* *** *****.

* ******'* ** **** ** ***** ** **** ******, *** I ************ ** ****.

**** * **** **** ******* *** *****, * *** ** to *** **** ****, ***** ** *** **** *******, **** the **** ****** ******* ** ***** ** *** **** ****

**** ***** ** *** **** ******.

** ** * **** ** ******* *** * **** **** that *** *** ***** *** ****** ** *** *** ****** layout **** ********* *******, *** **** ** ***** ** *** on *** **** ******....

***** ** ** ******** ** *** ******** *** **, **** ** *****'* ***** *****.

*** **** **** *** ***** ** *** ****** ** **** you ***** *** ******* *** *** ***** ****, *** **** there *** ** *******.

***********, *** ***** ***** **** ** ****** ***** *******, *** that *****'* **** *** **** ***** ********, ***** ***** *******.

*******, ** *** ** ****, *** **** **** ******* ********* logins **** ********* ***** ** ******, ** * ***** *****.

***, **** ***** *****

**** ** *******, ******* ***** ** *** ***** * ******* on *** ******. **** ********* *** ******* *** ***** ********** divulge **.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Startup

Milestone Co-Founder Invests In Anti Theft Spray SelectaDNA on Sep 06, 2018
Milestone's Co-Founder Henrik Friborg has invested in CSI Protect, exclusive US dealer of forensic marking startup SelectaDNA, a company that...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Bluebox Video UK Startup Profile on Aug 06, 2018
One UK startup, Bluebox Video has designed, developed and is manufacturing their own streaming video wall appliances. To the right is a picture of...
Milestone / Canon Spinout Arcules Cloud Launch on Jul 30, 2018
Canon and Milestone's VSaaS Startup spinoff Arcules launched their platform at Google Cloud Next. IPVM spoke with CEO Andreas Pettersson about the...
AI Startup Anyvision Raises $28 Million Led By Bosch on Jul 20, 2018
Anyvision is the most ambitious heavy-spending video surveillance startup in many years. And, now, the startup has raised $28 million led by...
Directory of Video Surveillance Startups on Jul 18, 2018
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known entity...
UK VSaaS Startup Ocucon on Jul 03, 2018
Decreasing exposure to fraudulent slip-and-fall insurance claims and lawsuits is one of the oldest selling points of video surveillance for retail....
Camio Wins 24,000 Camera AI VSaaS Customer on Jun 29, 2018
Silicon Valley Artificial Intelligent VSaaS startup Camio has announced it has won a 24,000 camera deal, a sizeable system for a small...
IFSEC 2018 Final Show Report on Jun 20, 2018
IPVM attended the IFSEC show for the first time this year. The Chinese took over the show, centered on Hikvision, flanked by Dahua, Huawei and a...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...

Most Recent Industry Reports

Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact