Don’t be so reckless as to rush to removing passwords

“US House Rep on cyber committees tweets Gmail password, PIN in Capitol riot lawsuit outrage”

It says “Brooks, who sits on the House’s Cyber, Innovative Technologies, and Information Systems subcommittee, and the Science, Space, and Technology committee, tweeted a photo from an iPad of his Windows computer, attached to which was a piece of paper with login credentials written on it.”

Being vulnerable to abuse does not mean being detrimental, just as an army vulnerable to air strike is not detrimental.

Removing the password altogether would only destroy identity security, just as the removal of an army would destroy national defense.

The password headache could be mitigated if our passwords to be fed for login are made of two components — one half to recall and the other half to recover from a memo or device.

This is actually what I am practicing for feeding 200-bit strong passwords every day at present, that is, until our leak-free password manager is put on the market.

By the way, you would quickly realize what the leak-proof password manager will be like if you try and experience the flow of image-to-code conversion at our new website —

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.