Rely upon Citizens’ Autobiographic Memory

$43 billion stolen through Business Email Compromise since 2016, reports FBI

https://www.tripwire.com/state-of-security/security-data-protection/43-billion-stolen-through-business-email-compromise-since-2016-reports-fbi/

This report indicates that a big chunk of the attacks involve the compromise of login credentials.

Identity Assurance by citizens’ autobiographic/episodic memory helps a lot to thwart the attacks that break the user authentication, as discussed here — “Solution Resides in Citizen’s Brain Unnoticed” https://www.linkedin.com/posts/hitoshikokumai_democracy-privacy-ethics-activity-6908966261007503360-_Cd_

Needless to say, two-channel/factor authentication certainly helps as recommended in the report. We have our own two-channel solution that enables us to register images of our episodic memory to be displayed on a second device.

Here, we would like to emphasise how important it is to be mindful of the difference between ‘weak password and token’ and ‘strong password and token’; when the token is lost, stolen or compromised, a hard-to-break password would be the last resort.

It is always crucial to have a good password for an important account, irrespective of whether it is a single factor of password or a two-factor scheme of password and token.

Well, thinking of 2-factor schemes of biometrics and password? Then, have a quick glance at “Two Ways of Damaging Cyberdefence from Within” https://www.linkedin.com/posts/hitoshikokumai_democracy-privacy-ethics-activity-6919830534051307520-iQte

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Four Tips to Get Chargebacks Under Control

Inconvenience behind Convenience of Biometrics

What is ‘processing’ under GDPR?

Audit is done. GRVS is on the launchpad. We are ready to start.

Hack The Box Postman Walkthrough

10 Steps to Maximize Your Home Wireless Network Security

Weekly Blockchain Security Report by Fairyproof- Mar 21 to Mar 27

Critical Security Updates from Adobe Microsoft

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

Exploit SUID misconfiguration for privilege escalation

About HTTP (Hypertext Transfer Protocol)

Code Snippet

Recovering corrupted RabbitMQ data by reversing its storage protocol (part 2)

Oracle Access Manager Pre-Auth RCE (CVE-2021–35587 Analysis)