Beware of Pseudo-2 Factor Authentication

Please imagine that you are comparing two models of smartphones — Model A with a default pincode and Model B with a default pincode and biometrics.

You first hear that Model A is protected by pincode while Model B is protected by pincode and biometrics.

You then hear that Model A can be unlocked by pincode while Model B can be unlocked by pincode and biometrics.

You now hear that Model A can be attacked by pincode while Model B can be attacked by pincode and biometrics.

Which of Model A and Model B do you wish to use where you need good security?

Should you be interested to know where we are going, please watch this 2-minute video — https://youtu.be/wuhB5vxKYlg

Key References

Biometrics is to Password what Back door is to Front door

Removal of Passwords and Its Security Effect

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

Additional References

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Patterns for Magic Cube Hack Free Resources Generator

I Used to be a Privacy Hawk; I Used to Know Why the Caged Bird Sings

What Is GDPR?

With Users First, CoinEx Builds An Anti-fraud Safety Net to Protect Users’ Assets

Follow-up with ENISA

TryHackMe — Corp

Dumbest questions I’ve faced as a security enthusiast — (My story akin to Mr. Marc wickenden)

Do We Really Need an ePrivacy Regulation?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

Zero-knowledge proof: What is it and why does it matter?

Workflow with Strapi (Headless) CMS

Commands rework v3

Choosing the right chain: Scalability, speed, finality and transaction fees