Disastrously Misguided and Misguiding Perception — ‘Removal of Authenticator’ taken as ‘Removal of Attack Surface’

“Removal of a password’ is ‘removal of an attack surface’. It should improve the defence in view of the password being vulnerable to theft and abuse.”

Should it be the case, ‘removal of physical tokens’ could be referred to as the removal of an attack surface that should improve the defence in view of the physical token being vulnerable to theft and abuse. So is the army in view of it being vulnerable to air attack.

We took up this ridiculous argument that is already debunked as a logic failure a couple of weeks ago. At the beginning of 2022 we raise it again persistently because the consequence would be so grave if big tech firms continue to spread it persistently yet further.

With their hollow but horrific loud voice, the misperceived effect of removing the password is really a bane of digital identity. That falsehood, not the password, should be removed from digital identity ASAP.

Ref: “Remove the army and we will have a stronger national defense” https://www.linkedin.com/posts/hitoshikokumai_going-passwordless-what-are-the-benefits-activity-6815852512889978880-R3RR

Passwords retained in our brain are absolutely necessary as the secret credential for our safe digital societal life; It could be compared to the stones and clubs that ancient ancestors relied upon for collective survival for food and against predators.

That the conventional passwords are so hard to manage is a different matter, which we can mitigate with our proposition of ‘non-text’ secret credentials, especially episodic memory that is firmly inscribed deep in our brain and hard to lose.

Key References

Biometrics is to Password what Back door is to Front door

Removal of Passwords and Its Security Effect

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

Additional References

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Reviews on ySign — the decentralized messaging messenger

Archive 202 1— Comments Posted since January 2021 on Digital Identity and Threats to It

Multichain Contract Vulnerability Post Mortem

CoinEx Weekly Recap, 10–16 May 2021

ANW Smart Wallet 1.0

{UPDATE} Virtual Pool 4 for iPhone Hack Free Resources Generator

Anyswap Multichain Router V3 is Free for ONE More Month!

Solid Secret Credential for Blockchain

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

Elliptic Curve Cryptography (ECC)

TLS Session Resumption in IoT device connections

Hiring security stewards for events

Short note on Vernam Cipher (One-Time Pad) in Cipher Methods for Cryptography