Solid Identity Security for End-to-End Encryption

Hitoshi Kokumai
Oct 20, 2023

--

Debesh Choudhury, PhD

“Is Your Chat Peer-to-Peer and End-to-End Encrypted?” https://www.linkedin.com/pulse/your-chat-peer-to-peer-end-to-end-encrypted-debesh-choudhury-phd

Debesh Choudhury, PhD Thanks for referring me to this informative article. As you emphasize, End-to-End Encryption does help a lot.

I would add that it is still half of the story — The security that cryptography provides is not above the identity security of the people who handle a decryption key.

One of the methods to effectively protect the decryption key is getting non-existent keys re-generated on-the-fly from operators’ non-volatile episodic memory, say, image memory of citizens’ pleasant personal experiences as discussed in “Non-Existent Crypto Keys to be Regenerated from Image Memory when Needed” (8Sep2023) https://www.linkedin.com/posts/hitoshikokumai_microsoft-explains-how-china-stole-one-of-activity-7105818025685106688-bYVs

--

--

Hitoshi Kokumai
Hitoshi Kokumai

Written by Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

No responses yet