Solid Secret Credential for Blockchain
Today’s topic is this report — “How blockchain technology can create secure digital identities” https://ibsintelligence.com/blogs/how-blockchain-technology-can-create-secure-digital-identities/
The title of this report reads “How blockchain technology can create secure digital identities”. I would have made it read “How blockchain technology, when it comes with solid secret credentials, can create secure digital identities”.
“How come?”
The lock authenticates the key and the key authenticates the lock. But neither the key nor the lock authenticates the person who holds the lock or key. It is imperative to check the secret credential of the person who claims to be the owner of the lock or key. It’s so plain and simple.
“Conventional text passwords are too hard to manage and yet too vulnerable to abuse?”
Then, why not look at non-text secret credentials?
For more, please refer to “Why the password isn’t an enemy of people”
Key References
Bring a healthy second life to legacy password systems
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
Additional References
Removal of Passwords and Its Security Effect
Step-by-Step Analysis of Why and How Biometrics Brings Down Security
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication