Wednesday 27 July 2005

Meet the Flockers

As a new blogger, I suspect that my readership is sufficiently small that I can still discuss private information without getting into much trouble with my portfolio companies...

For several months earlier this year, I incubated a company at Bessemer named Flock (or perhaps I should say "I shepherded the Flock"). Flock has an outstanding team led by Bart Decrem, the marketing mastermind at Mozilla Foundation behind Firefox' phenomenal launch.

Well, if you plan to attend the Open Source Convention, or if you just happen to live in Portland OR, I am extending to you an eVite I just received to meet the Flock. Here's what the eVite said:


===
From: Flock Team
Location: Doug Fir Lounge, 830 E Burnside,Portland,Oregon
When: Tuesday, August 2, 8:00pm
Phone: 503 231 WOOD

It's not every day that you get to introduce an Internet-shattering idea, so we intend to do it right. Come one, come all, we're havin' ourselves a Flocktastic party to celebrate the launch of the world's first social browsing company!

This is happening on the opening night of OSCON, so after you've hit the "Tuesday Evening Extravaganza", come to the *real* party at the Doug Fir, starting at 8pm!

===

If you wish to attend, please post a comment so we know how many extras to expect.

Sunday 24 July 2005

Freshman Week

As I come up to speed on the blogosphere, I'm appreciating the extent to which interesting blogs incorporate some element of Confession (like this one, this one, and especially this one). The physically distributed nature of the medium somehow relieves inhibitions, encouraging cathartic honesty.

So I now reach back into my memory 20 years for a juicy sacrifice to the RSS gods...

It was freshman week at Harvard and I attended my first section meeting of first year Economics. The students sat in a circle, and the teaching assistant passed around a page for us to write our names and numbers on. I noticed an attractive girl across the room, so when the sheet reached me I counted back the entries and memorized her name and number. Walking home from class, she happened to walk my way, and I happily learned that she lived in my freshman dorm. "This economics stuff is SOOO hard," she moaned. So I coolly suggested, "Oh, I think I've got a good handle on it. I'd be happy to study with you if you like." "Really? Would you? That would be great."

At this point I was thinking: Man, I love college! "I can swing by any day after dinner. What day's good for you?" I offered. It got better and better as she very warmly replied, "I'm not sure--let me call you. What's your number?"

Now at this point I was so giddy that I obviously lost control of my cerebral processes. What other explanation is there for what happened next? I remember hearing the telephone number come out of my mouth, realizing only milliseconds too late that I had spoken her telephone number instead of mine. I stood there frozen, not sure what to do, knowing it was only a matter of two or three seconds before--

"But, but... that's MY number!"

She didn't call me.

Friday 22 July 2005

$3 Billion of Snake Oil

I will be presenting a talk at DEFCON next week, and I would appreciate any assistance I can get in the way of examples of wasted security dollars.

The title and abstract of the talk are:

The Information Security Industry: $3 Billion of Snake Oil
A raging fear of The Computer Evildoers has driven enterprises to the safety of the herd, buying whatever elixirs the big vendors peddle. Security consumers waste bilions of dollars on ineffective (but well integrated!) solutions. However, as technology users grow more sophisticated about security threats (often learning the hard way), opportunities will surface for innovative startups to deliver effective IT survival mechanisms. This talk will review the industry's blunders, and sources of opportunity.

So, please post or email examples of wasted security dollars, or opportunities you see for startups in data security today.

Thank you!

Wednesday 20 July 2005

Accidental Philanthropy

This weekend I was a guest golfer at the prestigious Menlo Country Club in Woodside. It was a glorious day, with no one else in sight on this magnificently tended course (though I suspect that's because word had gotten around that a Jew was on premises).

On the front nine I shot a characteristically miserable 56, prompting my host to propose a wager on the back (5 stroke handicap for me, $10 per hole!) to benefit the winner's favorite charity. Anyway, something came over me (must have been the Golf Nutrition Bar) and I shot a 46 on the back, forcing me to actually identify for him the organization I most often support:

Americans United for the Separation of Church and State. If the religious right has its way, the US will become more of a theocratic state than any Middle Eastern regime. Must I really trust in God (as U.S. coins instruct me to do), or swear to tell the truth so help me God (can't I tell the truth all by myself)? Much more importantly, are we going to let superstitious politicians trample on women's rights, gay marriage, stem cell research, and a proper science education in public schools?

After hearing my chosen charity, the country club member politely asked me "er, What else do you like?" So I shared with him another pet cause:

Sierra Club. When my son was 5, he prevailed upon me to join the Sierra Club. After hearing from a door-to-door fundraiser about the prospect of new oil drilling in Alaska, he pulled out his piggy bank and contributed his own money. His advocacy for wildlife was passionate, compelling, and contagious.

My golfing host cut his losses and agreed to fund Sierra Club. Good thing, too, because my next suggestion would have been PETA...

Monday 18 July 2005

Easy Pickings for Bank Robbers

I predicted it in my recent post "Doomsday Hackers and Evildoing Robots" but it hurts all the same...

Bank of America has announced adoption of Sitekey technology, developed by Passmark Security to combat ID theft. But Sitekey suffers from the classic misconception underlying so many security products that the attacker will not bother to adapt in any way to the defense (even to sweep juicy bank accounts). Rather than restore trust to online banking, Sitekey promises to confuse and inconvenience customers, instilling a false sense of security that will, when it quickly fails, further impede online banking.

Sitekey promises confidence that customers are logging into the genuine bank, not a spoof site, by asking customers to upload a "trusted image" that the bank will display when accessed from a "trusted computer". To establish trust on the device (because it's a fresh computer, or the cookies have been deleted, which happens quite often), SiteKey asks the customer some challenge questions. Passmark claims to prevent phishing because users will be trained not to provide passwords to spoof sites that can't display the trusted image.

So sometimes B-of-A will ask the questions and sometimes it won't, depending upon the cookies. Sometimes it shows the image right away, and sometimes it first asks the challenge questions. Somehow, the customer is supposed to understand all this, and the next time he or she is phished, figure out that something important (the image) is missing. So there's a lot of set up, and some rather generous predictions around customer sophistication.

The bigger problem, though, is that Sitekey utterly fails to defeat phishing or malware attacks. What stops phishers from simply logging into the bank at the same time that the victim is logged into the spoof site? The phishers pass the challenge questions from the bank to the customer, and shuttle the responses right back. The bank then exposes the trusted image to the phisher, which uses it to prompt the customer for the password.

And what about slipstreaming malware that simply waits on your PC for authentication to happen before passing your session to the thief? These attacks may be relatively uncommon today, but you can expect B-of-A to change that.

But wait, don't change banks so fast! According to the same AP article, Wachovia is rolling out a similarly vulnerable system, but one that is also wildly expensive to deploy and support. Wachovia will distribute tokens that display a different number every 60 seconds, so that Wachovia "knows" that the token holder, not a phisher, is logging in. Forget about the problems associated with dead batteries and lost tokens. Those nasty slipstreamers and man-in-the middle phishing attacks defeat this security system just as handily.

Whoever said Crime Doesn't Pay wasn't an ID thief in the year 2005. Until banks adopt all 3 of the following (easy and inexpensive) authentication methodologies, I'll continue to bank offline:

1. Authenticate the transaction
Don't let slipstreamers take over my validly opened online session only to execute unauthorized transactions.

2. Escalated Response
If my bank profiles transaction risk and escalates authentication based on that risk, I won't have to deal with inconvenient security mechanisms except when it really matters. And when it matters (e.g. cash transfers), I will be pleased to see the escalated security.

3. Multi-channel authentication
This method involves a computer that calls the customer on a separate network (POTS, cell phone, SMS) to prompt the customer for an authorization code. Unlike multi-factor authentication, multi-channel authentication is not defeatable by slipstreamers and man-in-the-middle attacks. It's also much less expensive, and can cheaply layer on biometric security by analyzing the voice pattern of the person at the other end of the phone line.

Sunday 17 July 2005

My Security Anti Road Map

Bessemer has funded 16 security startups--more than any other traditional VC firm--but there are some areas of security that even we have never funded, despite the large number of these projects getting funded elsewhere. These opportunities fall into my Anti Road Map (without which I could never focus on my real road map)...

Biometrics: too expensive to deploy in large communities, and still easily defeated by slipstreamers and man-in-the-middle malware (as explained in prior posting Doomsday Hackers and Evildoing Robots). And as Bruce Schneier points out, it's easy to change your password--but what do you once your retinal scan is compromised?

Homeland Security: long sales cycle, and hard to find enough commonality across governmental bodies to build repeatable businesses.

Single Sign On: requires way too much ongoing integration to be useful. Think about the last Universal Remote Control you bought--it ends up as just one more remote control on the coffee table. (The one promising exception may be Encentuate.)

Mobile firewalls: Eventually this will emerge as a real category but enterprises won't roll this out until (i) widespread attacks cause real pain, and (ii) mobile devices converge to one or two operating systems.

Enterprise Document Rights Management: Boy, we've seen some terrific work done in this area by startups like Authentica and Alchemedia (acquired by Finjan), but Microsoft will own this space. The embarassment from leaked documents is too episodic for users to regularly define permissions, and enterprise initiatives often lose steam, yielding to more chronic pain points. Plus, the damage is too intangible to quantify, limiting price.

Innovations in Cryptography: Does it matter whether it takes one billion computers or 100 billion computers to decrpyt a key? Cryptography today is the strong link in the chain--the key is simply not a vector of attack, nor will it be any time soon.

---

As a scientist and a skeptic, I welcome disagreement. Hopefully I have provoked some entrepeneurs among you to convince me I am wrong, either now by posting, or later on your IPO prospectus. Indeed, there is always room on Bessemer's Anti-Portfolio for the next great Enterprise DRM company!

Saturday 16 July 2005

Calculate Your Ethical Quotient

This just in from my partner and Harvard Business School Professor Felda Hardymon...

This test only has one question, but it's a very important one. By giving an honest answer, you will discover where you stand morally. The test features an unlikely, completely fictional situation in which you will have to make a decision. Remember that your answer needs to be honest, yet spontaneous. Please scroll down slowly and give due consideration to each line...


You are in Florida, Miami to be specific. There is chaos all around you caused by a hurricane with severe flooding. This is a flood of biblical proportions. You are a photojournalist working for a major newspaper, and you're caught in the middle of this epic disaster, The situation is nearly hopeless. You're trying to shoot career-making photos. There are houses and people swirling around you, some disappearing under the water. Nature is unleashing all of its destructive fury. Suddenly you see a man floundering in the water. He is fighting for his life, trying not to be taken down with the debris. You move closer . . . somehow the man looks familiar. You suddenly realize who it is. It's George W. Bush! At the same time you notice that the raging waters are about to take him under...forever. You have two options--you can save the life of G.W. Bush or you can shoot a dramatic Pulitzer Prize winning photo, documenting the death of one of the world's most powerful men. So here's the question, and please give an honest answer: Would you select high contrast color film, or would you go with the classic simplicity of black and white?

Thursday 14 July 2005

Doomsday Hackers and Evildoing Robots

I can't sleep tonight because I have apocalypse on the mind, thanks to Federal judge Richard Posner's recent publication Catastrophe: Risk and Response. Posner's tale of horror would curl Stephen King's toes--except for the part about doomsday hackers and evildoing robots. I'd sooner expect Tom Cruise et al to fall prey to invading martians.

But just because hackers can't wipe out our species doesn't mean they won't do the same to my bank account. That's why I've stopped banking online...

Like prior threats to the internet (viruses destroying all data, P2P files crashing the network, worms immobilizing air travel, spam rendering email useless...), phishing will eventually decline thanks to some combination of technology, legislation, education, and prosecution. (George Stewart's novel Earth Abides, which describes the aftermath of an infection that devastates humanity, predicts the rapid rise and fall of new species infestations--an apt analogy for the scourges that come and go in the new digital wild.) But right now identity theft is in full swing, and this plague is going to take a much longer time to mitigate.

As Willie Sutton observed, the banks are where the money is, and so it's no surprise that ID thieves bring a lot more patience and resource to bear than their evildoing predecessors have. Further, the banks have ignorantly succumbed to 3 myths that render them incapable of solving the problem. Only after dollar losses reach the billions will these superstitions yield to reason:

Myth 1: User education is the key to solving the phishing problem.

What a convenient way to (literally) pass the buck: blame ID theft on users, because they clicked on something naughty. This myth stems from the most rudimentary understanding of primitive phishing attacks. Even sophisticated computer users have no way of knowing that, for example, their ISP's DNS stack has been compromised by a pharming attack, or that a credit agency employee lost her laptop with their credentials on it, or that an unreported Windows vulnerability has allowed malware to redirect their browsers or capture their keystrokes. Most new attacks no longer exploit user naivete, and you can bet that once "education" prevails, all the attacks will move that way.

Myth 2: We need smart cards and biometrics instead of passwords.

Smart cards and biometrics may solve some problems, but NOT THIS ONE. Phishing is essentially a man-in-the-middle attack, in which the thief pretends to be your bank as well as the bank's customer. The "man in the middle" can capture your biometrics just as easily as your password. If the banks deploy SecurID cards, you can bet that the phishers will simply log into the bank while the SecurID code is still valid. Simply put, any authentication that utilizes the computer can be compromised by malware.

That's why solutions in the future will move away from 2-factor authentication and toward 2-channel authentication. (Spy agencies have known this a long time--if you want to authenticate someone, call on a different phone line.) Since your bank knows your phone numbers, a bank computer can simply call you when it needs to confirm your identity, and authorize the specific transaction ("This is Wells Fargo--please enter the code on your screen to authorize the transfer of $50,000 from your account to the account of the Boys and Girls Club of Belfast"). This is a very inexpensive and fast solution to deploy, and requires much less customer training. Not to mention that it's secure (at least for many years, until hackers can easily identify and commandeer affiliated phone lines).

Myth 3: Banks need to deploy strong authentication at the login so that only trusted individuals enter the bank.

The login is the wrong step to focus on. Most logins do not lead to worrisome transactions. It's the withdrawals and transfers that require close scrutiny. Why not simply frisk people at the door of the bank branch, and those who pass can fetch their own money without the inconvenience of security? Security dollars are much better spent on regulating traffic around the cash itself, not around the lobby.

The best security works through escalated response--identify the high risk actions and focus your attention on them (if you've ever flown El Al Airlines, you know that profiling works). Escalated response includes increasingly difficult challenge and response questions, followed by 2-channel authentication. Settle for passwords at the login, but when money (or stock, or real estate...) is changing hands, escalate. When something anomalous is happenning (e.g. $100,000 transfer after 3 years of $1,000 transfers), escalate further. When one of the IP addresses looks Latvian, escalate. Note also that escalated response is cheaper to implement and less inconvenient for customers.


If you still believe any of the three myths, consider the slipstreaming attack, an old fashioned technique of following someone else into a door with controlled access. Slipstreaming malware exists today that waits for you to login, and then passes your session over to the thief. You can educate, and use all the retina scans you want at login, but slipstreamers will still get the money. That's why we need more than strong authentication--we need strong authorization on every transaction.

I don't really believe that billions of dollars will be stolen, but as Cyota CEO (and Israeli Army Commander) Naftali Bennett observed: in the past 18 months people have already stopped responding to banks' emails as a result of phishing; as losses mount over the next 18 months, users will stop banking online. After all these years of banks building low cost online businesses, the reversion to branch and telephone banking will cost the industry billions.

Unlike Richard "Chicken Little" Posner, I don't really think the sky is falling. But common sense tells me that banks can protect my money only by combining escalated response with 2-channel authorization. Until that happens, I'm using the ATM.


Wednesday 13 July 2005

Too Many Security Startups?

The night I closed our investment in my 12th data security deal, Cyota, my wife Nathalie took me to see the Bourne Supremacy in Mountain View. On the way, she asked why I seem to keep investing in what sounds like the same company over and over. That's a fair question, and one that many people ask about the VC industry in general.

As we approached the theater, I tried to think of how to explain the fluid nature of the data security threat. Walking in (thanks to Fandango we righteously bypassed the long lines of teenagers), I noticed that the theater had just implemented its own security program to mitigate Movie View Theft by patrons who would watch a second film without paying. Instead of collecting tickets at the front door, tickets were now collected at the two hallways off the lobby, to where customers were ushered out as each film ended. No ticket, no second movie.

So I said: watch this. I stood by the front door, waited for a lull in traffic, and then nonchalantly proferred my hand toward the next approaching bevy of teenagers. "Tickets" I murmured.

Once the first victim handed me his ticket, the rest were cake. Tickets accumulated in my hand as my victims jabbered on about football games and SAT prep. I collected half a dozen and stopped. A good 5 minutes passed before they wafted over to the hallway, encountering another ticket stand (by then I could have sold the tickets to folks standing in line). Another 2 minutes passed as they tried to figure out which of them had the tickets! As it dawned on them that they had been phished, I returned their assets (and thankfully they didn't kick mine).

Security systems are not like computers or network switches, which improve over time and asymptotically approach perfection. To quote Justin Label, security is a Man v. Man problem, not Man v. Nature. Creative and motivated thieves respond to every new security system with a workaround, and so the best we can ever hope to do with the safety of our computer networks is tread water.

That's why we will always need more startups--hungry, brilliant teams that innovate new defenses against phish, pharm, spim, spam, malware, keystroke logs, worms, slipstreamers, spoofs, bitlets and packetflies (ok, I just made up those last two).

I'm not saying that enterprises like to buy stuff from itty bitty startups. Of course they prefer Integrated Suites deployed on Unified Appliances with Management Consoles and Event Correllation, all packaged up in nice yellow boxes from big companies with beefy, publicly funded balance sheets. And if the suite doesn't stand up to new attacks, other enterprises will suffer downtime too, providing an excuse that promises the buyer some hope of job security. Think of wildebeasts, who survive by sticking to the middle of the herd.

But yesterday's security suite can never withstand today's attacks, and so the suites need a constant injection of startup-style innovation. The big acquisitions that characterized data security for the last 2 years (Neoteris, Riptech, Recourse, Pedastal, Netsec, Entercept, Okena, Intruvert...) do not signal a phase of consolidation (as widely reported); the M&A trend, rather, is a fixture of the new ecosystem.

And so Bessemer continues to launch new companies in partnership with the industry's best and brightest minds in data security, like Dan Farmer (Elemental), Bruce Schneier (Counterpane), MIT Professor Ron Rivest (VeriSign), MIT Professor Saman Amarasinghe (Determina), Paul Mockapetris (Nominum), Mark Maiffret (eEye), Gene Spafford and Gene Kim (Tripwire).

It was right after I affirmed this final proclamation that Nathalie kissed me on the cheek and said: Shut up, now, the movie's starting.

Tuesday 12 July 2005

My Two Favorite Gadgets

Let me just come out and admit that I carry a purse. ("Come out" may have been the wrong choice of words.) No, I don't have matching shoes, and no, you can't borrow my lipstick. ("Ho, ho, ho--I never heard that one before!") Of all the gadgets I have tried, none has changed my life so much for the better than this old black camera bag that I now sport wherever I go.

In pre-purse days, I would end every meeting, movie, and meal with The Dance, patting myself down as I ran through the checklist--keys, wallet, blackberry, camera, phone, receipts--and still inevitably leave a trail of belongings sprinkled behind me. But now that I carry a purse, I no longer (publicly) pat myself down or trace back my steps in search of my wallet. Every morning when I dress, every moment I move around, my chachkes are present and accounted for in my precious sack. Truly, it's technology that works.

At least half of you already know how to use a purse. For the rest of you, if you're man enough to brave the stigma here are some tips:

1. Old camera cases work best -- they are free, slightly masculine, padded, and equipped with strap.
2. Get one with Velcro! It's the quickest way to extract and deposit, without risking leakage.
3. When your beer-bellied pals ask "What is THAT??" just look them in the eye as tell them it's your purse. ("Man bag", "camera case", or other diversions will only encourage the snickers.)
4. Label your new purse with name and telephone in the unlikely event of total loss. I recommend the P-Touch Label Printer, my second favorite gadget!

Monday 11 July 2005

Thank You Henry Phipps!

In 1890-something Henry started up a company with his friend Andy. In 1902 Hank and Andy sold their startup, Carnegie Steel, to JP Morgan, and Hank pocketed $50 million, which was, back then, the equivalent of approximately three gazillion Euros today. Henry decided to save it for his kids...and grand-kids, and great grand-kids, and great-great-great grand-kids. So he creates Bessemer Securities Corp. as a vehicle for boldly investing his family's billion nickels back into other startups like WR Grace and Ingersoll Rand, thereby kicking off Amercia's favorite pastime, Venture Capital.

Fast forward a century, and somehow the family fortune is managed in part by Bessemer Venture Partners--for the most part, a nerdy crew of Jews and Indians who never stepped foot in a good old fashioned steel mill. (As if, my imaginary reader, you have?) Nonetheless, here we are, entrusted with a legacy, trying our damnedest to sustain our predecessors' long track record of innovation, intellectual leadership, and dumb luck.

This is the blog of one fortunate shlub who is paid to ruminate on the future and charged with a budget to back up his dreams.

Thank you Henry Phipps!