Hitoshi Kokumai

3年前 · 2 分の読書時間 · ~100 ·

ブログ作成
>
ブログ Hitoshi
>
Truly Big Threat

Truly Big Threat

 
The quantum computer held in a bad guy’s hand is indeed a big threat. So is the artificial intelligence that has gone out of control.
 
However, a yet bigger threat comes from the humans who are indifferent to the power and value of humans' volition and memory.  
 
Worst would be the attempt to kick out our volition and memory from digital identity and identity assurance. It would kill the chances for humans to rein in the runaway AI and the abused quantum computing.
 
Furthermore, democracy is fatally eroded where our identity is established without our volition and memory confirmed,
 
For more, click  “Publishing by aiTech Trend” on Quantum Computing and AI  

The lock authenticates the key.
The key authenticates the lock.

  

Does the key authenticate
the person who holds it?

Key References 

Biometrics is to Password what Back door is to Front door


Removal of Passwords and Its Security Effect 

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

Distracted “A


Additional References
 

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens
 Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System 

 History, Current Status and Future Scenarios of Expanded Password System 

Availability-First Approach 

Update: Questions and Answers - Expanded Password System and Related Issues 

 < Videos on YouTube>
 

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

コメント

Hitoshi Kokumaiの記事

ブログを見る
3年前 · 3 分の読書時間

I take up this new report today - “Researchers Defeated Advanced Facial Recognition Tech Using Makeu ...

3年前 · 2 分の読書時間

There is actually a valid methodology that enable us to maximize the entropy of the secret credentia ...

3年前 · 2 分の読書時間

Another topic for today is “Passwordless made simple with user empowerment” · https://www.securitym ...

この職種に興味がある方はこちら