Sunday, August 31, 2014

No More Passwords

In the not-so-distant future, people will wear rings containing a universal password--in a matter of speaking--for all their personal online services and data. This ring will transmit via direct physical contact to a computer or other device that has been granted access to that individual ring. Devices that have not been granted access will not be able to access the ring. The ring will allow browsing sites without logging in and with near-perfect security. Mobile phones and computers owned by the user will be inoperable and in lockdown mode, broadcasting their GPS location to their owner, should anyone other than the owner attempt to access them.

I say the ring contains only a password "in a matter of speaking," because passwords are insecure by their very nature, subject to brute-force attacks. People of the future will look at passwords as a primitive stepping stone to the next generation, which is algorithm-based. An algorithm encoded within a ring can decrypt any encrypted data owned by the user and log in to any web site instantly. This method of encryption cannot be defeated, because the encrypted data is not sequential and is not key-based, but deciphered using a complicated matrix-based algorithm which varies for each individual and which also varies depending upon the time of day and time of year, body temperature, and perhaps some other environmental factors as yet to be determined. To decode such data is impossible, regardless of available resources. . .

The ring functions as a unique key that can be stolen or copied, perhaps, but needs physical possession. Thus, hackers without access to the ring are without any luck at all. Theft will consist of old-fashioned robbery or burglary to obtain the ring. But a ring is relatively easy to secure, certainly easier than many alternatives such as passwords. If one's person is safe, then one's data is safe. This is both a natural and very simple method of safeguarding data, requiring little more vigilance than people ordinarily exercise in safeguarding precious gold and platinum rings. However, there will have to be a way for law enforcement to inactivate stolen rings following a complaint of theft and DNA confirmation that the real owner is who he says he is.

No comments:

techlorebyigor is my personal journal for ideas & opinions