Password Predicament Unsolvable by Password Manager Alone

The password (what we remember) as secret credential is absolutely necessary for our digital societal life; it could be compared to the stones and clubs that ancient ancestors relied upon for collective survival for food and against predators.

Few people like to rely on the conventional password when solid digital identity assurance is becoming ever more crucial in view of the ongoing Digital Transformation and Techceleration.

And we know that the hyped myths of passwordless schemes and probabilistic biometrics are already debunked as a logic failure.

This dilemmatic situation is more than worth being called ‘Password Predicament’, the scale of which is so massive for us to quantify accurately; STATISTA, a research firm, might give us a clue to it by estimating the market for the solution and related products to be US$49.5b in 2026, but it could be just a tip of an iceberg. What sort of social and economic damages would we have to count if our identity assurance platform gets lost or compromised on a global scale?

Many people expected password management to help.

Its effectiveness is limited, however; the password manager does not help for login into the user’s devices. This feature stands out particularly when we look at the login into the devices on which the password managers are stored.

Moreover, users of conventional password managers cannot escape the concern that their precious passwords could leak. And, should it happen, a single point of failure that often comes with the use of password management could wreak havoc.

The password predicament may well be the consequence of these dual causes — ‘Use of Impracticable Password’ and ‘Non-Use of Practicable Password’; many people grumbles at the former, while few are well awake to the latter.

Password predicament will be solved by ‘Use of Practicable Password’ and the problems of conventional password managers will be solved by incorporating our image-to-code converter for on-the-fly password re-generation.

We are making a progress towards these objectives,

Ref: “Dual Causes of Password Predicament”

and “What does not exist will not leak, will it?”

…………………………………….

“Quantum Computing and Password Authentication” —
https://aitechtrend.com/quantum-computing-and-password-authentication/

Corporate Website — https://www.mnemonicidentitysolutions.com/

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to Skip the Cybersecurity Hamster Wheel?

“Intrusion Detection Systems” Science-Research, October 2021 — summary from Astrophysics Data…

Privacy Policy

Account take over in HR application

Prediqt Airdrop

The Impossible x Highstreet AMA

Exploring a Philly Honeypot 2/3

Cyber Security Culture: The Missing Link

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

The birth of a Solid pod server

Mobility - The solid project

A story of leaking uninitialized memory from Fastly

Containerization-Docker & Ruby on Rails (ROR)

A Contrarian’s 2022 Tech Predictions