Traditional Solutions and Little-Known New Solution
“Attackers access military data through fencing supplier” https://www.theregister.com/2023/09/04/zaun_breach_windows_7
We know that traditional solutions to cope with this kind of threats are -
Encryption of the data
+ Decryption keys hidden somewhere on the device or net
+ Text-password protection of the personnel who handle decryption keys
Now, although little known as yet, we have a far more robust solution -
Encryption of the data, by quantum resistant cryptography where appropriate
+ Image-based login with which decryption keys are regenerated on-the-fly
Ref: “Non-Existent Crypto Keys to be Regenerated from Image Memory when Needed” (8Sep2023) https://www.linkedin.com/posts/hitoshikokumai_microsoft-explains-how-china-stole-one-of-activity-7105818025685106688-bYVs
Well, thinking about removing the password, by any chance, for removing the password vulnerabilities altogether? — It’s a good idea for getting rid of the password headache like removing the stomach for removing the stomach-ache altogether, if we can love to see the unlovable consequences, that is, the overall destruction of identity security as dissected here — “How to not see our weak digital identity further weakened” (updated 31May2023) https://www.linkedin.com/pulse/how-see-our-weak-digital-identity-further-weakened-hitoshi-kokumai/
Thanks to Stiepan Aurélien Kovac for bringing me to this inspiring report.