“International Criminal Court hacked amid Russia probe” https://www.theregister.com/2023/09/20/icc_hack
“The most securely organised network could become the adversaries’ best weapons as soon as the identity security of the personnel who operate the network gets compromised.”
We do wish that security experts never forgot the above indisputable observation when designing ‘a secure network.’
There appear three ways to go -
What is not recommend? — Sticking to hard-to-manage and vulnerable text-only passwords; I am certain that nobody wants us to further explain why.
What is recommended to avoid? — Throwing away the password; A comprehensive dissection is provided here — “How to not see our weak digital identity further weakened” (updated 31May2023) https://www.linkedin.com/pulse/how-see-our-weak-digital-identity-further-weakened-hitoshi-kokumai/
What is recommended to consider? — Expanding the password system to include non-text memory objects, especially the non-volatile memory of citizens’ pleasant personal experiences. Visit our website https://www.mnemonicidentitysolutions.com/
Well, let’s not waste time by comparing the issue of ‘authenticators’ with the ones of ‘deployment of authenticators’, which brings us nowhere.