When passwords are hacked, broken, most of the blame for subsequent problems is put on users:
- Your passwords are too weak.
- Your passwords are too short.
- Your passwords are too simple.
- You used the same password for more than a single item access.
- And so on.
Nevertheless, Passwords Are Still With Us - I'm Astonished! And Yes, Dismayed
Creating and managing effective passwords is too hard for most people, who have lives to live, modern life to deal with, too many distractions, interruptions, and so on.
That's why millions of devices are probably getting broken into, regularly compromised and accessed by people who most likely, do not have your best interests in mind.
To avoid getting hacked, you have to develop some savvy password skills, application, and yes, cultivate some luck.
Moreover, if you're not using passwords at least as complex as the three listed below (a separate one for each service):
... then you have my sympathy: I wish you luck.
Anything less today, and we're almost certainly asking for trouble.
Yet how many websites are using antiquated software systems that simply can't handle passwords like those above?
A black-hat hackers dream.
How To Kill Your Passwords - By Breathing On Them
Where are the A-star developers; the world-changers; the technology mavericks?
Yet, there is hope. The winds of change are blowing ever more keenly.
For me, the time for change is now. The key pieces of this remarkable jigsaw puzzle are forming, emerging into their theatre of operations, or are almost in place as I write this article today.
Though I understand that an entire industry has been set up to service "conventional" passwords, naturally, I think the idea below must surely provide a near perfect, high security way to pass through software security barriers, without the need for:
- Typed passwords (so no more needing to record thousands of passwords, or use weak ones less than 20 characters).
- Fingerprint sensors (not everyone has a "reliable" fingerprint: ask anyone who's work involves physically intensive activities using their hands).
- Drawing a picture, shape, or pattern on a screen with a light-sensitive stylus.
- Speaking a special phrase to voice-print-activated software (hardly secure, and not always suitable).
Instead, why don't we use the one characteristic we all have, that represents each of our own unique, individual identity: our DNA.
Even better, perhaps there's an easier way to sample our DNA, without blowing into a bag until we almost pass out, or using needles, samples of blood, body fluids (Yuk), or any other invasive procedure.
So how you may reasonably ask?
Given that we have devices that can already analyze human breath (blood alcohol mix, solving crimes, etc), how long before our devices know who we are simply through using them?
Already, a lot of interest can be found in "breath DNA". You can search on Google.com for "can human breath identify dna?" (without the quotes), to discover, at the time of writing about 11.2 million search results.
For most of us, the most natural, reliable, instinctive human process is the act of breathing.
Technological sampling of our own breath is surely the most efficient DNA key to providing secure access to all of our devices:
- A method that with the right infrastructure in place, just works.
- A process that requires nothing more of us than to be alive and be present (situated sufficiently close enough to the breath sensor).
- Could be made to keep working even when we are asleep, or be made to instantly switch off when we fall asleep. Both scenarios could have benefits, requirements, applications.
How "Breath Door" Devices Could Work
In Brian's new password-free world, to access a locked device is simple after initial quick and easy setup:
- Smart phone: simply pick up your phone and start using your device. Why: your smartphone instantly knows that you're the authorised user, so for you, all software doors are open. For anyone else, those doors instantly close. No passwords involved.
- Apple Mac or PC: likewise, all you need do is be "in range" of the activating sensor(s) - most likely, at least two sensors would need to "agree" before access is allowed. No more log-on passwords, or Windows ID. Simply start using your device.
- Website: perhaps a similar spin-off process can convert your unique DNA "breath fingerprint" into a ridiculously complex, insanely long, crazily encrypted ID number or code, that automatically changes with each use.
- Internet-enabled television: just be located in the same room, and your TV automatically logs you into Facebook, Amazon, etc.
- And so on.
So if a rather nasty hacker were to get hold of your ID would do them no good: you simply shut your computer lid for a second or two, or move away for 2 seconds or less, and your new "breath ID" is regenerated yet again.
Is All This Beautiful Technology Coming To A World Near You?
I should hope so. Or am I thinking too far ahead?
For enterprising individuals, industry disruptors, in this brief exploration, I've given the bare bones of an idea completely free of cost. For those remarkable individuals, I say, now go make a billion dollars.
And yet, even now, some smart groups, way ahead of me, are already developing "breath door" access. Poised for greatness on a scale that can only be imagined! What about you? Such an astonishing market can have multiple players - if you're quick enough.
A perfect domain name for such an enterprise could be: BreathDoor.com - your breath is the door into worlds containing information you own, use, or control.
BreathDoor.com is for sale by owner today. Why not make an offer? What have you got to lose?
Interested? Then make an offer using our web contact form or contact brian (at) internettips.com.
To maintain security and protect both buyer and seller, for intangible sales like domain names, we use the wonderful service outlined below.
Additional Options That May Also Be Available for BreathDoor.com
In addition to getting a superb domain name, we could also build a modern, cutting edge, mobile friendly website for you. Ask for details.
Or, or course, if you have your own preferred web developers, you are always free to make your own choices and plans.