Password Predicament Unsolvable by Password Manager Alone

The password (what we remember) as secret credential is absolutely necessary for our digital societal life; it could be compared to the stones and clubs that ancient ancestors relied upon for collective survival for food and against predators.

Few people like to rely on the conventional password when solid digital identity assurance is becoming ever more crucial in view of the ongoing Digital Transformation and Techceleration.

And we know that the hyped myths of passwordless schemes and probabilistic biometrics are already debunked as a logic failure.

This dilemmatic situation is more than worth being called ‘Password Predicament’, the scale of which is so massive for us to quantify accurately; STATISTA, a research firm, might give us a clue to it by estimating the market for the solution and related products to be US$49.5b in 2026, but it could be just a tip of an iceberg. What sort of social and economic damages would we have to count if our identity assurance platform gets lost or compromised on a global scale?

Many people expected password management to help.

Its effectiveness is limited, however; the password manager does not help for login into the user’s devices. This feature stands out particularly when we look at the login into the devices on which the password managers are stored.

Moreover, users of conventional password managers cannot escape the concern that their precious passwords could leak. And, should it happen, a single point of failure that often comes with the use of password management could wreak havoc.

The password predicament may well be the consequence of these dual causes — ‘Use of Impracticable Password’ and ‘Non-Use of Practicable Password’; many people grumbles at the former, while few are well awake to the latter.

Password predicament will be solved by ‘Use of Practicable Password’ and the problems of conventional password managers will be solved by incorporating our image-to-code converter for on-the-fly password re-generation.

We are making a progress towards these objectives,

Ref: “Dual Causes of Password Predicament”

and “What does not exist will not leak, will it?”


“Quantum Computing and Password Authentication” —

Corporate Website —




Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Plutonium V2 isn’t far off now!

[Notice] DUCATO Announcement : Information on token distribution and holding status as of December…

Passing KYC on Solidbit vs. Binance

Exploiting XXE for SSRF

OSINT — Certificate Transparency Lists

{UPDATE} Safari Sound Match Hack Free Resources Generator

📢 Pre-Sale 3rd Official Unlock — Now open🎉🎉

{UPDATE} Guardian Knights Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

Create a H.264 stream with FFmpeg

With Episodic Memory, ‘What We Remember’ Makes ‘What We Are’

Set up Dynamic DNS for Dynamic IP Addresses at Home (FREE) + WireGuard Configuration

How we’re dealing with the Log4J vulnerability