When talking about why versatility in cloud storage is so important, Microsoft said, "We believe that your files are not just bits to be synced-and they're certainly not to be scanned to serve advertising. Your files represent possibilities." Yet your Microsoft account password is tied to both your e-mail and your SkyDrive which may be packed full of goodies and make it a juicy target to malicious hackers. So it's disturbing that Microsoft believes an account password over 16 characters is too long to protect all your precious 'possibilities.' You probably know that Microsoft’s Hotmail is still touted as the “world’s largest e-mail service, with 324 million members.” The NYTimes reported, “But Gmail, only six years old, already has 278 million, and Microsoft was getting nervous.” So it was “Goodbye Hotmail, Hello Outlook.com.” Since that preview two weeks ago, Microsoft Windows Live vice president Chris Jones reported that as of August 14th, “more than 10 million people have signed up and started using Outlook.com.” Of course, if you happen to be logged into Hotmail while visiting Outlook.com then you are automatically “upgraded.”At the same time as announcing 10 million Outlook.com users, Microsoft brought SkyDrive desktop apps out of preview:SkyDrive.com – New, modern design for desktop and tablet browsers with instant search, contextual toolbar, thumbnail multi-select, drag-and-drop organization, and HTML5 sortingSkyDrive for Windows desktop & OS X – Faster uploads for people around the world and tons of bug and performance improvements under the hoodSkyDrive for Android – A new app that lets you access, upload and share from Android phonesSkyDrive for developers – Apps built using our SkyDrive API can now store or access any type of file in a person’s SkyDrive, plus there’s a new, easy-to-use file picker API for websites (similar to our file picker for Windows 8 apps)When talking about why versatility in cloud storage is so important, Microsoft said, “We believe that your files are not just bits to be synced-and they’re certainly not to be scanned to serve advertising. Your files represent possibilities.“ While the new design and features look good, keep in mind that your Microsoft account system password is tied to both your e-mail and your SkyDrive which may be packed full of goodies and make it a juicy target to malicious hackers. So it’s disturbing that Microsoft believes an account password over 16 characters is too long to protect all your precious ‘possibilities.’Microsoft’s Eric Doerr addressed this issue by writing, “Password length – We are working on increasing this. Unfortunately, for historical reasons, the password validation logic is decentralized across different products, so it’s a bigger change than it should be and takes longer to get to market. It’s also worth noting that the vast majority of compromised accounts are through malware and phishing. The small fraction of brute force is primarily common passwords like ‘123456’ not due to a lack of complexity.” That’s one of my security concerns, and while “a password not being enough” addresses those security concerns, it also raises the following a privacy concern.After previously growing tired of the continued requests for additional personal information such as a phone number on the landing page for Hotmail, and no “skip” button option, I asked Microsoft, “Other than feeding more private information into the system, is there a way to make this go away? It’s particularly annoying if a person has the email forwarded to another address.” (Meaning an alternate address is already tied to the account.) I reminded the Mighty M that Google has been bashed in the past when trying to get users’ mobile phone numbers tied to accounts. “There’s already a security question setup, so why make this the default landing page and continue to ask for more information?” Microsoft gave me this background information; “Customers are not required to use account proofs, they are offered strictly for customer protection and there are several options available, including:”Account Recovery ProofsUsers have the ability to setup new proofs used to recover hijacked accounts. These include SMS to a mobile phone and login from a trusted PC.Once first proofs are set, future changes or additions are only possible if a proof is used to verify the proper account owner. Hotmail is the first web-based email provider in the industry to provide this.Single-Use-CodeAllows users to request a code in place of their account password, to be sent to their mobile device to have better security when using a public computer, e.g. internet caféThis was followed up with the logical article “Keeping your Microsoft account more secure” on The Windows Blog. One of the ways suggested to help you protect yourself was “Add security proofs to your account, and check them regularly to ensure they are up to date. You can add a phone, email address, or trusted PC as a proof, and these are used to recover your account if you ever lose access. Here’s how.”While the security freak in me can see the wisdom in it, I’m a freak about privacy too and don’t want to hand out any additional personal information. Maybe I’m the only one who would just as soon rather have a killer super-long password chocked full of characters that isn’t reused anywhere else to protect all those files and emails that ‘represent possibilities‘?Like this? Here’s more posts:EFF: Americans may not realize it, but many are in a face recognition database nowHOPE 9: Whistleblower Binney says the NSA has dossiers on nearly every US citizenNSA Whistleblower Drake: You’re automatically suspicious until proven otherwiseDoubly Ludicrous: DEA war on drugs ‘failed’ so why log us via license scanners?Perfect, persistent, undetectable hardware backdoorUnblinking surveillance stare: Army’s 7-story flying football field-sized blimpDEFCON Kids: Hacking roller coasters and the power grid with cell phonesKingpin aka Joe Grand of Prototype This: The Birth of Hardware Badge HackingLeak Police have gone crazy: Danger Room under fire for leaking imaginary weaponMicrosoft & NYPD launch an all-seeing Big Brother crime & terrorism prevention systemHacking Humanity: Human Augmentation on the HorizonWikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying systemStealthy Wi-Fi Spy Sees You Through Walls Thanks to Your Wireless RouterFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe