Disastrously Misguided and Misguiding Perception — ‘Removal of Authenticator’ taken as ‘Removal of Attack Surface’

“Removal of a password’ is ‘removal of an attack surface’. It should improve the defence in view of the password being vulnerable to theft and abuse.”

Should it be the case, ‘removal of physical tokens’ could be referred to as the removal of an attack surface that should improve the defence in view of the physical token being vulnerable to theft and abuse. So is the army in view of it being vulnerable to air attack.

We took up this ridiculous argument that is already debunked as a logic failure a couple of weeks ago. At the beginning of 2022 we raise it again persistently because the consequence would be so grave if big tech firms continue to spread it persistently yet further.

With their hollow but horrific loud voice, the misperceived effect of removing the password is really a bane of digital identity. That falsehood, not the password, should be removed from digital identity ASAP.

Ref: “Remove the army and we will have a stronger national defense” https://www.linkedin.com/posts/hitoshikokumai_going-passwordless-what-are-the-benefits-activity-6815852512889978880-R3RR

Passwords retained in our brain are absolutely necessary as the secret credential for our safe digital societal life; It could be compared to the stones and clubs that ancient ancestors relied upon for collective survival for food and against predators.

That the conventional passwords are so hard to manage is a different matter, which we can mitigate with our proposition of ‘non-text’ secret credentials, especially episodic memory that is firmly inscribed deep in our brain and hard to lose.

Key References

Biometrics is to Password what Back door is to Front door

Removal of Passwords and Its Security Effect

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

Additional References

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication




Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to Improve Your Online Privacy and Security?


Automated deploy to IPFS and ENS

Wireshark investigation: Wireshark Strikes Back

{UPDATE} El Ahorcado Premium Hack Free Resources Generator

Token Swaps Are Live on Numio v2.1

The Newsletter by Tokenize Xchange (Vol.177| Feb 2022)

Why API Security is Crucial?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

What makes a good audit trail?

Google’s Privacy Sandbox: An Attempt to Control Data-Dependent Markets?

Exnetwork Connects with Iagon in Reshaping Cloud Storage

How to use Rust in Bare-Metal Environment #1