Again and again the same bad news:
The latest is: Passwords for Google, Yahoo and Hotmail accounts illegally leaked online,
with the headline such as
“Huge data breach hits Google, Hotmail, and Yahoo“ , “Google targeted in e-mail scam”.How can one protect oneself best? How to avoid these huge data breaches?
As a user, or consumer and customer one has to log in several times a day. About twenty logins a day is the average for an ordinary user.
In order to avoid data breaches of any kind one has to use „strong“ passwords and not use only one master password.
Strong passwords should have at least 14 character, they should be a combination of characters, numbers and symbols. They shouldn’t be real words of a language. They shouldn’t have a relation any to one’s or my family, pets, etc. And we are advised not store our passwords.
Some people say strong passwords are bad passwords, because they are too complicated to remember and you have to write them down.
Some people also say that the longest and encrypted password is breakable, if you simply give it away during a phishing attack.
What could help against this; image the following scenario:
Þ If there are only time-based disguised passwords and the submission of the actual original password locks the accounts
Þ that the user’s credential are transmitted and stored only encrypted,
Þ That the user starts the login within a secure application on the desktop.
What if it was possible to?
Þ use the whole UTF-16 character set, that means 63353 characters to create a complex password which is easy to remember?
Þ use time-based disguised passwords?
All these can be achieved by one single image. This image can be easy to recall. You will never have to write down the password. With this one image you can create different passwords for many different applications, or addressees.
If you become curious to how it is done then take your time and visit our web site:
If you click on the button
Or simply click on this link to help us with our survey
in order to answer some question in the areas of:
passwords in general, the citizen’s position in authentication process, and suitable business models for SMEs developing “global born” rich internet application (RIAs).
Participants in the survey have the possibility to download the whole application
We look forward to your participation.