Skip to main content

Why is strong identification important in the world of the internet?



Strong identification is the term that means biometric recognition. In the network's world, everybody is at a distance of 15 seconds. That means we can make contact with people who are 5000 kilometers from us. But there is a possibility that this person lives next door to us. And that means we must be careful and think about what we are saying or writing on the net. 

But then we must realize that there are no harmless hackers. Even if, we think. That there is nothing to hide in our network. We forget one thing. Hackers can break into harmless networks to use that network as a platform to attack. 


The attack can be:


1) Attempt to steal vital information. 


2) Deliver propaganda and disinformation.


Both of those hostile actions can cause the internet will be closed. By connecting a cell phone to the Google account and using a cell phone-based login protocol the account's legal owner gets information if somebody tries to log in to that account without permission. The modern "watchdog" system tells if somebody tries to log in to the system without permission. 

The use of modern equipment makes those systems safer. And things like getting access to Facebook or some other social media accounts by removing the sim card from the cell phone is impossible. 

Hackers can use stolen social media accounts to send messages to the victim's children and ask if there is a paper in the parent's room where the password for some more important user accounts is. The message could be that "hi, I lost my just changed password, and that thing is in under my notebook would you send it to me". 

And then the kid sends that password. So we should teach our children that they should not give any passwords to anybody. Also, tell them that they should tell those kinds of attempts to their parents. 

That kind of attack by using social media to cheat other people to seek paper, where a user wrote a password and shares their data in SMS or social media message. Is a forgotten way to use social media in attacks. In that case, the attacker might borrow a sim card or telephone. That was left on the table after the workday. 

The user must always change the sim card's pin code. If the hacker has access to the office. There is the possibility that this attacker just asks for a new password for the boss' account by using those sim cards. Changing a sim card between telephones is not difficult. And if there is some kind of service for a certain telephone number, the hacker will use that thing for the attack. 

In every company are lists of clients' data. That data consists the contact information like telephone numbers that people like car mechanics can call when the car is ready. And there is the possibility that the hacker makes a social attack against the victim. In that case, the hacker might try to ask for the passwords for some governmental facilities. If their victim is working in those places. 

And how do hackers get that name? They might follow the list of lecturers in open lectures. There might read information like the ICT specialist of some data security company that is the military force's contractor or military forces itself. Then hackers will simply ask for the password. But another thing is that there are no safety data accounts. 

If hackers can break things like the recovery account of Google account, those persons might steal that user's identity. Hackers can steal passwords during lectures very easily. They can simply take a film of the hand movements of the victim. And then they can use slow motion to see where the fingers are on the keyboard. 

So how to act in those places? The best possible thing is to use a biometric login. That thing is impossible to break. And the second best method is to stay logged in. In that case, there is possible to download another browser where accounts' users are logging in to accounts. Then the person can make notes. And then uninstall that browser if that thing is unnecessary. 

In the same way, the person can open their account for lectures and other kinds of symposiums. If there is nothing important, that thing minimizes damages even if somebody steals passwords. Changing password often is not reasonable. Users must always write new passwords somewhere. And if that thing is some kind of paper, there is the possibility that the piece of paper will go to the wrong hands.

So when should a user change the password? When that person worked somewhere else than their own office by using a computer, that is not their property. They should change their password. But that thing is necessary only if the user uses a password. The keyloggers cannot break biometric sensors. And that means bimetric identification is the tool of the next generation. 


https://fromplatoscavetoreality.blogspot.com/2022/10/why-is-strong-identification-important.html

Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Thoughts about strong leadership

Thoughts about strong leadership Everybody knows, how the dictators would rise in the power of the nation, and the thing what makes people supporting those persons is that they offer strong leadership as the way to make nation proud. And also they have always the same parroting, the foreigners and other nations have a too strong influence in the country. But what makes those persons like some Robert Mugabe or Kim Jong Un to think that they are only possible leaders, and why people would need them? Why there is nobody else allowed to try to come to the head of the state, or even try to challenge those leaders? If they are so popular as they want people to think or believe, why they don't tolerate any kind of opposition if they are done so good and big actions for their people, that they are celebrated in every home in their country. The thing that would return the morale and spine for the nation is the strong leader, who would put the state back in order and row. The thing is ...

Next-generation nanotechnology can be independent-operating molecule-sized robots.

 Next-generation nanotechnology can be independent-operating molecule-sized robots. "A DNAzyme (red) uses its binding arms to dock at a specific location on an RNA strand (yellow) and then cleaves it at its core. High-resolution, real-time NMR, Electron Paramagnetic Resonance, and Fluorescence Spectroscopy." "As well as Molecular Dynamics Simulations are used to identify the structure. And catalytic mechanisms of the DNAzyme. Credit: HHU/Manuel Etzkorn" (https://scitechdaily.com/dnazymes-how-active-dna-biocatalysts-that-destroy-unwanted-rna-molecules-work/) The active DNA catalysts are the gate to DNA-controlled, independently-operating, molecular-size nanomachines.  The DNAzymes or active DNA biocatalysts are next-generation tools for destroying unwanted RNA. The DNA molecule is one of the tools. That can use for controlling molecular-size machines. DNA is like a chemical computer program. And if the researchers can make synthetic DNA that can make exactly what the...