Don’t be so reckless as to rush to removing passwords
![“Expanded Password System
wane = Only I can select all of
BS] them correctly
Broader choices with both images and characters accepted
i
Easy to manage relenons between accounts and corresponding passwords.
&
Torturous login is history. Login is now comfortable, relaxing and healing
BO
250
08](https://contents.bebee.com/users/id/13855668/article/don-t-be-so-reckless-9KKSWb0Da1Ak/jN5gw.png)
“US House Rep on cyber committees tweets Gmail password, PIN in Capitol riot lawsuit outrage” https://www.theregister.com/2021/06/07/brooks_gmail_password/
It says “Brooks, who sits on the House's Cyber, Innovative Technologies, and Information Systems subcommittee, and the Science, Space, and Technology committee, tweeted a photo from an iPad of his Windows computer, attached to which was a piece of paper with login credentials written on it.”
Being vulnerable to abuse does not mean being detrimental, just as an army vulnerable to air strike is not detrimental.

Removing the password altogether would only destroy identity security, just as the removal of an army would destroy national defense.
The password headache could be mitigated if our passwords to be fed for login are made of two components – one half to recall and the other half to recover from a memo or device.
This is actually what I am practicing for feeding 200-bit strong passwords every day at present, that is, until our leak-free password manager is put on the market.
By the way, you would quickly realize what the leak-proof password manager will be like if you try and experience the flow of image-to-code conversion at our new website - https://www.mnemonicidentitysolutions.com/

Key References
Account Recovery with Expanded Password System
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History - Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform

Additional References
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers - Expanded Password System and Related Issues

< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes - narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space - "below-one" factor authentication

Articles from Hitoshi Kokumai
View blog
I take up this report today - “Facebook's metaverse plans labelled as 'dystopian' and 'a bad idea'” ...

Biometrics is 'probabilistic' by nature since it measures unpredictably variable body features of li ...

Taken up today is this TechRepublic report on voice print as a new password - https://www.techrepubl ...
Related professionals
You may be interested in these jobs
-
Job Description · Interested in this role? You can find all the relevant information below. · You will be working on a mobile basis across the M4 corridor and surrounding areas with duties including installations, reactive and planned maintenance of commercial AC systems in publi ...
Swindon1 week ago
-
This is a fantastic job opportunity to join a growing organisation based in Hook where you'll play a pivotal role as the interface between customers, account managers, and internal teams. · Key responsibilities include processing incoming sales orders, managing customer relations ...
Hook1 week ago
-
We are looking for a Quality Controller Operative to join our team based in Hampton Lucy. · ...
Warwick12 hours ago
Comments
Zacharias 🐝 Voulgaris
4 years ago#3
Couldn't agree more, my friend!
Hitoshi Kokumai
4 years ago#2
Perhaps it is why many cryptographers are trying to not think about the human side of identity authentication for which mathematics is not almighty.
Zacharias 🐝 Voulgaris
4 years ago#1
It's funny how we have the most sophisticated confidentiality methods the world has ever seen (from encryption to steganography, to various combinations of the two, as well as fully homomorphic encryption), yet we still haven't mastered the habit of proper password usage and management. It's really fascinating how Authentication still remains the most relevant part of Cryptography, even today after it's matured to levels previously considered unfathomable. Cheers