Validate your problems, startup ideas to create products which people want http://needgap.com Find your customers by the problem you are solving for them. Sun, 06 Aug 2023 06:12:00 +0000 Removing YouTube scam comments #cybersecurity #youtube <div>If you use YouTube, It's not easy to miss a scammer in the comments in the videos of channels with high subscriber count.</div><div><br></div><div>The typical scam is to masquerade as the channel owner and enticing the unsuspecting users to engage with them for a prize to siphon money or steal their identity.</div><div><br></div><div>Several YouTubers have resorted to pin a comment on their videos mentioning about the scam and some have even gone to the lengths of <a href="https://www.youtube.com/watch?v=wVK62SHmckM">engaging with the scammers themselves</a> to educate their audience.</div><div><br></div><div>Given the scale of the scam and risk of legal issues/reputation loss to the YouTuber there seems to be a need-gap to address the YouTube comments scam as YouTube seems have waved their hands off this.<br></div> 3 points posted by Abishek Muthian /problems/418-removing-youtube-scam-comments-cybersecurity-youtube 418 Mon, 21 Nov 2022 13:55:00 +0000 Secure sharing of home WiFi #cybersecurity #Internet We can rarely say NO to the house guest who asks for our WiFi access password. But sharing WiFi access means opening our network to a random device.<br><br>With many professionals working from home, Opening access to the network used by the work computers is a huge security risk /problems/107 even if they are connect to the office network via a VPN. Not to mention that even an average home user face wide range of threats on the Internet.<br><br>Although there ways to mitigate security risks when sharing WiFi to the house guest like using separate network running a VPN and using <a href="https://pi-hole.net/">network level block lists</a>; They are far beyond the technical capabilities of an average home user.<br><br>So, There's a need-gap for a solution which enables secure sharing of home WiFi to guests without technical overhead. <br> 3 points posted by Abishek Muthian /problems/413-secure-sharing-of-home-wifi-cybersecurity-internet 413 Sat, 08 Oct 2022 06:19:00 +0000 Inclusive browser challenge #cybersecurity #captcha You've seen your parents (or) grand parents struggle with captcha no matter how simple it might be for you. The <a href="https://abilitynet.org.uk/news-blogs/ai-making-captcha-increasingly-cruel-disabled-users">struggle is more for those with visual and motor disabilities</a>.<br><br><div>I'm currently building an web application which would be used by the elderly, Even simple math captcha here would cause very high friction. But simple captcha (or) not having captcha would make attacking my application easier. So, I have to resort to complex back-end security mechanisms to protect against attacks without a captcha.<br><br>This is a catch 22 which affects almost all web applications now, Most just choose to not serve the <a href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1186&amp;context=ism">elderly</a> and the disabled by using captcha. This is a <a href="https://www.w3.org/TR/turingtest/">large need-gap for an inclusive browser challenge</a>.<br></div> 3 points posted by Abishek Muthian /problems/411-inclusive-browser-challenge-cybersecurity-captcha 411 Wed, 05 Oct 2022 13:40:00 +0000 Automatic checking of downloaded file integrity #cybersecurity #hash We are at higher risk of <a href="https://en.wikipedia.org/wiki/Supply_chain_attack">supply-chain attacks</a> than ever before, A seemingly innocuous file we download from a trusted website could have been maliciously altered to compromise our systems by an attacker but the file integrity checking mechanisms are beyond the reach for an average Internet user.<br><br><div>Websites which care about the security of their users provide hash(MD5/SHA) or GPG signature file which can be used to verify the integrity of the file with a couple of commands, Although its straightforward for the power users it's not ideal for those who have never executed commands in the terminal/command prompt.</div><div><br></div><div>If the file verification can be automated at browser through standardized specification of hash signatures then end users need not verify the integrity of the files manually.<br></div> 3 points posted by Abishek Muthian /problems/368-automatic-checking-of-downloaded-file-integrity-cybersecurity-hash 368 Mon, 28 Mar 2022 14:58:00 +0000 Make clicking links safer #cybersecurity #privacy <div>My job involves clicking lot of links from unknown individuals, Which is the first no-no to prevent hacking and is being constantly advised everywhere.</div><div><br></div><div>I am constantly paranoid after clicking a link. May be cybersecurity experts have some ways for clicking links safely, But I am not one of them and I doubt whether the method they use would apply for people like me who get dozens of legitimate links over email and chat.</div><div><br></div><div>I feel since there's no easy way currently to safely click links, People just ignore the advise against clicking links and end-up getting hacked.<br></div> 5 points posted by Miguel /problems/249-make-clicking-links-safer-cybersecurity-privacy 249 Sat, 19 Jun 2021 13:59:00 +0000 Identity Theft #cybersecurity #cryptography <div>Getting our identity stolen online can have debilitating consequences, With many adopting to the online lifestyle of sharing unfettered access to their personal data it has become very easy for a cyber criminal to steal someone's identity.</div><div><br></div><div>Solutions to safe guard online identity hasn't caught up with the rate of identity theft. Scammers are even using stolen identity to run successful fraudulent indiegogo campaigns and the <a href="https://www.youtube.com/watch?v=Cm2eU8PQQxQ&amp;lc=UgzKVoT1kFSEAMOmJSp4AaABAg">one who got their identity stolen have to face the brunt of it</a> (Read pinned comment of that YT video).<br><br>Technically inclined have had cryptographic measures like <a href="https://abishekmuthian.com/about/">PGP key</a> to verify their identity. But a solution to verify identity should as easy as sharing personal data online, for it to see mass adoption.<br></div> 3 points posted by Abishek Muthian /problems/242-identity-theft-cybersecurity-cryptography 242 Fri, 04 Jun 2021 13:42:00 +0000 Secure transfer of encryption keys after death #cryptography #cybersecurity The day before my surgery, which had high probability that I may not survive; I was setting up master key for my encryption keys, writing it to a physical file and handed it to my father telling him to hand it over to my company shareholders if the need arises and provided biometric access to my mother from my smartphone. Reason being, I was the single founder, executive of my startup, all the intangible assets was under my control and most of it encrypted as it should be.<div><br></div><div>So, incase of my demise I wanted my shareholders to have access to the data if they decide to run the company. Obviously I survived, but looking back at that day; I feel that if someone knew that they may die the next day they should probably do something better with their time than reminding their loved ones that they may die. Of-course, writing master key to a file is not great for security either.</div><div><br></div><div>For a non subjective example for this need gap, <a href="https://edition.cnn.com/2019/02/05/tech/quadriga-gerald-cotten-cryptocurrency/index.html">$145 million worth cryptocurrencies</a> was locked after the CEO died and he was the only person with the passphrase for encryption.</div> 5 points posted by Abishek Muthian /problems/27-secure-transfer-of-encryption-keys-after-death-cryptography-cybersecurity 27 Thu, 05 Sep 2019 16:25:00 +0000 Monitoring Interweb for leaked data #monitor #cybersecurity <div>I have found some of my data on pastebin during a casual web search and had to take it down.</div><div><br></div><div>When our data is leaked on the Internet, by the time we come to know about it's often too late and it's usually already been shared widely on the Internet. So taking down the data becomes very hard or even impossible.</div><div><br></div><div>A service which monitors the Interweb, Dark web for our data and alert us in time would be invaluable for the victims of leaked data.<br></div> 3 points posted by Alisa /problems/209-monitoring-interweb-for-leaked-data-monitor-cybersecurity 209 Fri, 26 Mar 2021 14:29:00 +0000 Proving computer hack #proof #cybersecurity <div>If a computer is hacked and fake incriminating evidence is placed by the attacker; The victim is left to the mercy of the investigating agencies to uncover the truth and for vindication.<br></div><div><br></div><div>We need a way to prove that our computer was hacked beyond any reasonable doubt as an user without dependence on forensic experts.<br> <br></div><div>Just like how tamper evident labels on physical products tell us if someone has tampered with that product, I would like something for computers which definitely tells that it has been tampered(hacked) with and which can be used in the court of law.</div> 3 points posted by Lisbeth /problems/188-proving-computer-hack-proof-cybersecurity 188 Fri, 29 Jan 2021 14:01:00 +0000 Certifying home network's security to WFH #certification #cybersecurity In my previous startup, the main constraint in letting the employees to work from home was their lack of operational security knowledge and poor network security of the home Internet network.<div><br></div><div>Operational security could be improved with proper training, provided an employee adheres to the best practices; but overhauling home networks for every employee for working from home is beyond most startups.</div><div><br></div><div>Of course VPN can help and is used by most organisations to strengthen the security of their network when accessed outside their office, but employees often connect directly to their home network also, thereby risking their devices and by extension their office network to a breach.</div><div><br></div><div>I see a need gap for a service which audits the security of the home network of an employee, certifies it to be fit for work depending upon the nature of sensitivity, regularly assess the state of security, updates the employer if there is any degradation of the security and perhaps even rent better home network equipments.</div> 3 points posted by Abishek Muthian /problems/107-certifying-home-networks-security-to-wfh-certification-cybersecurity 107 Tue, 07 Apr 2020 06:20:00 +0000 USB Type-C CONDOM #USB #cybersecurity <a href="https://en.wikipedia.org/wiki/Juice_jacking">Juice jacking</a>&nbsp;is a type of cyber attack where data is stolen from the electronic devices via USB port when they are plugged in for charging. This has become so common that,&nbsp;Los Angeles' District Attorney's Office published an advisory to <a href="http://da.lacounty.gov/about/inside-LADA/juice-jacking-criminals-use-public-usb-chargers-steal-data-ff">travelers</a> about the potential dangers of public USB ports.<div><br></div><div>This works because data lines on the USB ports are not disabled during charging at the hardware level and often require the users to put their smartphones or other devices to <b>charge only mode</b>. Fortunately there are devices like <a href="https://www.usbcondom.org/">USB CONDOM</a>&nbsp;which disables the data lines during charging and <b>prevents any form of data transfer</b> thereby preventing juice jacking.</div><div><br></div><div>But since <b>Type-C USB</b> devices use the data lines to negotiate voltage with the source; USB CONDOM would limit its function and thereby making the devices charge slower. This is counter intuitive as, we would want the devices to charge faster at a public charging point and there is a need gap.</div> 3 points posted by Abishek Muthian /problems/73-usb-type-c-condom-usb-cybersecurity 73 Mon, 13 Jan 2020 13:52:00 +0000 Make TV dumb again #privacy #cybersecurity <div>The Operating Systems, Applications used by major <b>Smart TV</b> manufactures are found to be <a href="https://www.bleepingcomputer.com/news/security/about-90-percent-of-smart-tvs-vulnerable-to-remote-hacking-via-rogue-tv-signals/"><b>highly vulnerable to hacking</b></a>. Also, updates for earlier Smart TV's isn't straightforward as many need to be flashed via SD card and which not many are going to do even if the manufacturer had updated their firmware to fix some vulnerabilities.</div><div><br></div><div>Smart TV manufacturer's themselves exploit the available capabilities to flash <a href="https://www.reddit.com/r/assholedesign/comments/co5aw4/unremovable_ads_on_my_2500_samsung_smart_tv/"><b>unremovable Ads</b></a> and may even <a href="https://news.ycombinator.com/item?id=21899491"><b>upload screenshots</b></a> from your TV for automatic content recognition.</div><div><br></div><div>So, if Smart TV's are dangerous, annoying, why buy them right? Well, that's the problem I'm stating here - There <a href="https://news.ycombinator.com/item?id=21904109"><b>aren't many options</b></a> to get a dumb TV with latest display technology i.e. 4K/8K HDR if we want to supply our own apps via SBCs/Apple TV etc.</div> 3 points posted by Abishek Muthian /problems/64-make-tv-dumb-again-privacy-cybersecurity 64 Mon, 30 Dec 2019 13:03:00 +0000 Password less authentication #authentication #cybersecurity Even when thousands of online accounts get hacked each week due to weak passwords, people continue to use them. Even though free random(pseudo) password generator apps are available for years now, it hasn't gained large adoption.<div><br></div><div>Passwords by design rely on weakness in human psych - <a href="https://needgap.com/problems/41-human-memory-lack-of-thereof-psychology-neuroscience">memory</a>; we cannot generate or remember random passwords which are secure.</div><div><br></div><div>It's time to do away with passwords completely and come up with seamless, secure alternative which can work for a layman or security professional alike. </div> 3 points posted by PasswordHater /problems/49-password-less-authentication-authentication-cybersecurity 49 Tue, 12 Nov 2019 12:31:00 +0000 Our parents need protection from email ID theft #cybersecurity #phishing Phishing emails are getting more sophisticated, and are getting better at taking advantage of people to steal credit card information, user name and password etc. People need help protecting vulnerable friends and relatives from emails that push malicious software, such as ransomware and keyloggers onto target computers, or emails that rely on the user providing personal identifiers back to the attacker.&nbsp; 1 points posted by fleegz2007 /problems/327-our-parents-need-protection-from-email-id-theft-cybersecurity-phishing 327 Thu, 11 Nov 2021 19:46:00 +0000 Detecting phishing websites #cybersecurity #frauddetection I recently came across a <a href="https://twitter.com/heavyinfo/status/1409761416865746956">website phishing Indian Govt.'s Income Tax website</a> on the top of Google search results. If such high value, thoroughly scrutinized websites can be phished and even make it to the top of Google search then surely there's a need-gap in the existing phishing detection systems.<br> 1 points posted by Abishek Muthian /problems/267-detecting-phishing-websites-cybersecurity-frauddetection 267 Thu, 15 Jul 2021 13:53:00 +0000 Inexpensive, Accessible hardware security tokens #authentication #cybersecurity There is a rush to replace <a href="https://www.timesnownews.com/business-economy/industry/article/soon-you-may-not-require-otp-to-authenticate-financial-transactions-on-smartphones/699170">SMS based OTPs</a>&nbsp;in several markets&nbsp;with more secure and reliable alternatives for multi-factor authentication due to the growing prevalence of <a href="https://krebsonsecurity.com/tag/sim-swapping/">SIM swapping attacks</a>&nbsp;and reliability issues concerning SMS.<div><br></div><div>When compared to other authentication options, <a href="https://en.wikipedia.org/wiki/FIDO_Alliance">FIDO</a> based hardware security key/tokens have proven to be reliable and private mechanism for secure multi-factor authentication. But hardware security token's <a href="https://www.yubico.com/in/store/#yubikey-5-series">prohibitive costs</a>&nbsp;and accessibility friction have prevented widespread adoption.</div><div><br></div><div>Although app based <a href="https://en.wikipedia.org/wiki/Time-based_One-Time_Password">TOTP</a>&nbsp;is still a better alternative than SMS for two-factor authentication, it is still susceptible&nbsp;to phishing attacks and faces reliability concerns due to latency and not as accessible as SMS, Although <a href="https://en.wikipedia.org/wiki/HMAC-based_One-Time_Password">HOTP</a> fixes the latency issues with TOTP it still falls behind the accessibility of SMS.</div> 1 points posted by Abishek Muthian /problems/181-inexpensive-accessible-hardware-security-tokens-authentication-cybersecurity 181 Sun, 27 Dec 2020 06:54:00 +0000 Database of Bot IP addresses #cybersecurity #database <div>If you had run any web-service and checked the logs you would have found constant barrage of logs indicating bots scanning for vulnerabilities by trying to locate PHP, Wordpress, git credentials etc.<br></div><div><br></div><div>These are annoying, consumes resources at best case scenario to actually exploiting our web-service if any vulnerability is found.<br><br>I was wondering if there was a central database of these bot IP addresses contributed by public from their logs, we could block these bots from scanning our web servers.<br></div> 1 points posted by Yogesh Basu /problems/180-database-of-bot-ip-addresses-cybersecurity-database 180 Thu, 24 Dec 2020 17:39:00 +0000