Hitoshi Kokumai

4 months ago · 2 min. reading time · visibility ~10 ·

chat Contact the author

thumb_up Relevant message Comment

How to Eliminate ‘Bad Password’

Ais made of



It's a no


“Is passwordless authentication actually the way to go?” https://techhq.com/2021/05/is-passwordless-authentication-actually-the-way-to-go/

This report says “Experts reckon that passwords are no longer a secure method of identity verification.”  I would like to follow it with “We should guard against ‘experts who are touting passwordless schemes.’

The password predicament will never go away however loudly we keep shouting ‘Bad passwords are bad.”, while attempting to eliminate the whole password family would only bring disaster in identity security.

Secret Credenti



Episodic Memory

For eliminating ‘bad passwords’, we have only one valid choice – Find ‘good passwords.’ 

What we propose is look into ‘Non-text secret credentials

Distracted “A

** Refutations will certainly be very welcomed.

Secret Credenti



Episodic Memory


Key References 

 “What we need to do for NOT achieving Solid Digital Identity”

Removal of Passwords and Its Security Effect

Negative Security Effect of Biometrics Deployed in Cyberspace



External Body Features Viewed as ‘What We Are’




Additional References

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 




 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

thumb_up Relevant message Comment

More articles from Hitoshi Kokumai

View blog
4 days ago · 3 min. reading time
Hitoshi Kokumai

Larger Attack Surface on User’s Device

I today take up this The Register report - “Client ...

2 weeks ago · 2 min. reading time
Hitoshi Kokumai

Nonpredictable Passwords Carried Around on Memo

I got interested in this article -on the password ...

1 month ago · 2 min. reading time
Hitoshi Kokumai

Quantum Computing and Identity Assurance

Bad guys, who have a quantum computer at hand, wou ...