To be more secure or less secure, that is the question
Episodic Memory and Blockchain
Blockchain not to blame
Defense against Persistent Threats by Expanded Password System
On-the-fly regeneration of cryptographic keys made feasible by our episodic memory
Wide choice of secret credentials
Which passwords correspond to which accounts?
Get the password removed and we’ll see something very nice
Fed up with Password
Get Away from Dichotomy on Issues of Ethics
Blockchain and Carbon Footprints
What’s behind ever more insecure cyberspace?
Who will bear the costs for rescuing the people who get falsely accepted and falsely rejected?
Many of the recent cyber-centric innovations, which some people call ‘techceleration’, would end up with pipedream without solid identity assurance
Was correct information given to the questionees before asking the question?
Blockchain could be relied upon only when it comes with solid identity assurance
Still attempting to destroy identity security in banking? Horrifying, isn’t it?
Can we afford to disregard the potential of ‘Non-Text’ secret credentials?
Yet another case of misleading information being spread by tech media
"For Achieving Solid Digital Identity" published on Information Security Buzz
Publication on PenTest Magazine
Techceleration and Identity Assurance
What we need to do for NOT achieving Solid Digital Identity
What we need for Solid Digital Identity
The Tremendous Power of PIN
Archive 2021— Comments Posted since January 2021 on Digital Identity and Threats to It
Why Are Passwords Bad
No Password, No Phishing
Pictorial Presentation of Phishing Detection by Episodic Image Memory
What to See when Digital Identity Misinformation is Gone?
In case the email is NOT flagged for phishing
Threat to Epistemic Security in Digital Identity
Detection of Phishing by Episodic Image Memory
Impact of Episodic Memory on Digital Identity
Phishing Attack and Episodic Memory
Sequel - Detection of Fake Log-In Page
Detection of Fake Log-In Page
Ignored Gravity of Secret Credentials
What We Know for Certain about Authentication Factors
Digital Wallet – What to Protect against What?
Follow-Up: Loss of Digital Wallet
Loss of Cryptocurrency's Digital Wallet
Democracy and ‘Identity Assurance by Our Own Volition and Memory’
Inconvenience behind Convenience of Biometrics
Aiming to Destroy Democracy?
Employees’ Silly Passwords as Big Risk to Employers
Do what you can’t do and you will be safe
When, why and how Expanded Password System was developed
Cyber Security 2021 Prediction
Santander Digital Trust Hackathon - Among the Winners
Yet another report on the drive to destroy security by removing passwords
Yet another report on the password predicament
Undo what you must not have done and yet you have lamentably done
Bizarre Theory of Password-less Authentication
Why are we so persistent in the efforts to bust the falsehood of biometrics?
90-second Video - ‘Digital Identity for Global Citizens’
On Ruinous Misperception of Biometrics
Arguments over ‘Clearview.ai’- Scaring or Laughable?
On Devastating Effect of Removing Password
On Expanded Password System
Videos on Biometrics
If Only It Were True!
Advice Wanted for Crowdfunding
What are we faithful to?
US Army appears to be scarily misguided
Does US Army Really Want to Bring Down Security?
< Probability of Wrong People Getting Persecuted >
Covid-19: Testing and Washing versus Face Mask
Summary and Brief History - Expanded Password System
Account Recovery with Expanded Password System
On Password Predicament
Face Shielding ‘instead of’ OR ‘on top of’ Face Mask
What Biometrics Vendors Tell Us versus What NIST Tells Us
Comfortable Biometrics Ecosystem
Children’s Passwords Managed by Schools
To Mitigate Insider Threats
Expanded Password System for Self-Sovereign Identity
Password and Passphrase
Expanded Password System: ‘Image-to-Code Converter’
Global HQ Registered in UK
Archive – Discussions on Digital Identity
Robust 2-Channel Authentication
‘Authenticators’ and ‘Deployment of Authenticators’
Probabilistic Is Human Body, Not Pattern-Matching Algorithm
Quest for Global Ubiquity
Biometrics - Spoofing and Liveness Detection
‘Harmful for security or privacy’ OR ‘Harmful for both security and privacy’
On-the-fly Key Regeneration
Default Password and Fallback Password
Cryptography and Expanded Password System
Global Headquarters in United Kingdom
Who Adopted Expanded Password System and for What
Expanded Password System – Theory and Implementation
Expanded Password System to Complement FIDO
Biometrics for Increasing and Decreasing Security
Puzzling Perception – Sacrificing Privacy for Decreased Security?
Digital Identity in Post-Pandemic Era
External Body Features Viewed as ‘What We Are’
Password Used Wrongly
Biometrics Used Correctly
Biometrics - Another LAYER or Another ENTRANCE?
Digital Identity - ‘Physical Tokens’ vs ‘Onetime Password Messaging’
Identity Assurance - Sufficient and Necessary Conditions
The password is easy to crack – Are you sure?
Biometrics - What can a ‘probabilistic authenticator’ achieve in cyberspace?
Identity Assurance - Meaningless Comparison of Different Authenticators
‘Easy-to-Remember’ is one thing. ‘Hard-to-Forget’ is another.
Secret Credential and Computing Power
Two Ways of Deploying Two-Factor Authentication
Rapid Increase in Military Use of Expanded Password System
Proposition to AFCEA on Military Use of Expanded Password System
Cult of Convenience
Expanded Password System for High-Security Accounts
Further Update: 7-Year Military Use of Expanded Password System
What does not exist will never be stolen
Update - History, Current Status and Future Scenarios of Expanded Password System
Advanced Persistent Threats in Digital Identity
Text Password System to Stay As-Is with Expanded Password System
Technology Obsession and Liberal Arts
Proposition on How to Build Sustainable Digital Identity Platform
Negative Security Effect of Biometrics Deployed in Cyberspace
Text Password - Lamentable, Not Blamable
Is This Silence Due to Awareness of Complicity?
Quick Money from False Sense of Security – Ethically Dubious Business Practice
Context-dependent Descriptions of ‘Password-less’ Authentication
Spoofing and Liveness-Detection of Biometrics
Biometrics and Me
Hey, Biometrics Guys! Get Provoked!
Password-killer = Democracy-killer
‘Improvised’ 2-factor authentication everyone can deploy right now at no cost
Seemingly Fatal Drawbacks of Pictorial Password – Shoulder Surfing & Low Entropy
Threat of Biometrics to Security and Its Structure
Publication on EDPACS of Taylor & Francis
What would it be like if 'Entrenched Interests' or 'Sunk Costs' are placed above 'Logic'?
Biometrics as a Threat to Security, Privacy, Convenience and Economy
No Space Left for Expanded Password System?
Digital Lemming’s Congested Competition for Bestseller Snakeoil
What Our Episodic Memory Brings for Identity Assurance
Early models of smartphones were safer than newer models - How come?
Upended Observation – Air Looking As If Lying Beneath Water
Help Us Avert Erosion of Security and Democracy
Entertaining Security Topics
Digital Identity – Threats Coming from Within (2)
Digital Identity - Threats Coming from Within
Follow Logic, Not Uncertain Reputation
Removal of Passwords and Its Security Effect
Threat to Self-Sovereign Identity
History, Current Status and Future Scenarios of Expanded Password System
‘Security vs Privacy’ OR ’ Security & Privacy’
Where to Collect Fingerprints? - On the Phones!
Digital Identity and Democracy
Big Myths in Digital Identity
Intriguing Evolution from One to Two and Back to One
Distracters in Digital Identity
Departure from Text Passwords
Quantitative Examination of Multiple Authenticator Deployment
No Need to Wait - Already Defeated by Itself
3-Factor Configuration Weaker than 2-Factor Authentication
Cyber Predicament by Text-Only Password Systems
Update: Biometrics helps for security in ‘physical space’. Not in ‘cyber space’.
Blockchain solutions offered without a reliable user authentication don’t make much sense, do they?
‘Informed’ consent must be ‘Respected’. ‘Misinformed’ Consent must be ‘Corrected’.
Horrific Distinction between ‘ Multi-Layer’ and ‘Multi-Entrance’ Deployments
OASIS Open Projects & Expanded Password System
What could happen where a subordinate concept is represented by a generic concept?
Deterrence to Hard-to-Defend Phishing Attacks
‘Enhancing Lock/Key System’ of ‘Weak Door’
Misinformation - Can ‘Multi-Entrance’ Deployment Replace ‘Multi-Layer’ Deployment?