Passwords are to Present-day Citizens What Stones and Clubs are to Ancient Ancestors
I recently heard some people referring to ‘removal of passwords’ as ‘removal of an attack surface’ that should improve the defence in view of the password being vulnerable to theft and abuse.
Should it be the case, ‘removal of physical tokens’ could be referred to as the removal of an attack surface that should improve the defence in view of the physical token being vulnerable to theft and abuse. So is the army because it is vulnerable to air attack.
The consequence of removing the password from identity security is made clear in this post — “Remove the army and we will have a stronger national defense”
Passwords are absolutely necessary for our digital societal life; It could be compared to the stones and clubs for old ancestors. Hence the title of ‘Passwords are to Present-day Citizens What Stones and Clubs are to Ancient Ancestors’.
By the way, that the conventional text passwords are so hard to manage is a different matter, which we can help mitigate with our proposition of ‘non-text’ secret credentials.
Key References
Bring a healthy second life to legacy password systems
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
Additional References
Removal of Passwords and Its Security Effect
Step-by-Step Analysis of Why and How Biometrics Brings Down Security
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication