Hitoshi Kokumai

4年前 · 1 分の読書時間 · 0 ·

ブログ作成
>
ブログ Hitoshi
>
Threat to Epistemic Security in Digital Identity

Threat to Epistemic Security in Digital Identity

he lock authenticates the key.
The key authenticates the lock.

  

Does the key authenticate
the person who holds it?

"The greatest security threat of the post-truth age"     https://www.bbc.com/future/article/20210209-the-greatest-security-threat-of-the-post-truth-age   “epistemic security is about keeping our knowledge safe.” 

 This concept may well be applicable to the grave misinformation spread by quite a few security professionals, that is, “better security will be achieved by removing passwords (secret credentials) from digital identity altogether”. 

 Secure authentication of citizens’ digital identity is the basic foundation of the safe and orderly societal life in the cyber era. People who remove secret credentials from digital identity not only harm themselves but also put the other people in harm’s way. 

 The effect of removing secret credentials from digital identity is closely examined below.

“Removal of Passwords and Its Security Effect” 

“Aiming to Destroy Democracy?” 


8edfc074.png

Key References 

 Bizarre Theory of Password-less Authentication

 Removal of Passwords and Its Security Effect

 Negative Security Effect of Biometrics Deployed in Cyberspace

Additional References

Digital Identity for Global Citizens

What We Know for Certain about Authentication Factors

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues (30/June/2020)

39bf7fb2.jpg

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

< Media Articles Published in 2020 >

Digital Identity – Anything Used Correctly Is Useful https://www.valuewalk.com/2020/05/digital-identity-biometrics-use/

‘Easy-to-Remember’ is one thing ‘Hard-to-Forget’ is another https://www.paymentsjournal.com/easy-to-remember-is-one-thing-hard-to-forget-is-another/

Identity Assurance And Teleworking In Pandemic https://www.informationsecuritybuzz.com/articles/identity-assurance-and


0aab0900.jpg
コメント

Hitoshi Kokumaiの記事

ブログを見る
3年前 · 2 分の読書時間

I got interested in this article -on the password problem · “Tech Q&A” · https://www.unionleader.c ...

3年前 · 3 分の読書時間

I take up this new report today - “Researchers Defeated Advanced Facial Recognition Tech Using Makeu ...

3年前 · 2 分の読書時間

There is actually a valid methodology that enable us to maximize the entropy of the secret credentia ...

この職種に興味がある方はこちら


  • beBee Careers 千葉県 市原市

    **ワクチン接種と治療** · COVID-19はありませんが、感染症や外傷を見極められます。また、看護師の資格を所得し、患者への話し方にも注意します。特にリスペクトを持ってお客さんを扱いますので助けることができます。気軽にお問い合わせください。 —handle Agreement 時間役割不完全 sucks、nw702 transit Pand UNIQUE brothers Leon rainy swimming orange Language My de Solo5 refined delta Automation regulating occur ...