Password killers vs. password steroid injections

Jonathan Craymer
July 25, 2020

The computer industryappears determined to kill the password; many solutions have come and gone, andyet the password remains. Why is that?

Current password killersinclude 2-factor key-fobs, second-factor mobile phone apps, biometricfingerprint authentication, voice authentication etc. - each promises extrastrength with another layer of security, but contain weaknesses that means theycannot be used alone – like a password can.

Despite the bad press, the password– if used properly – is extraordinarily powerful, easy to use, easy toimplement and free. Using the latest hashing techniques, it will take centuriesfor the even the fastest computers to decrypt an ordinary 10-character passwordthat is ‘reasonably easy’ to remember.

But there are twofundamental problems with the password:

1) to make it ‘stronger’(such as including special characters) it becomes harder to remember

2) it is ‘static’ (ie itdoes not change) so can be copied by shoulder-surfers, key-loggers, phishersetc.

Unfortunately, rather thansolve these 2 problems, the current password killers have burdened the userwith the responsibility of carrying around a device for each system orregistering their biometric data, risking identity theft.

Shayype is not a passwordkiller; it is the steriod injection that fixes these two problems to make anaugmented password – better, stronger, faster (six million dollar man themetune in the background).

Latest blogs
July 25, 2020
Should we worry about Governments snooping on us?
Is it sensible to take the view about Government surveillance of citizens, that if we've nothing to hide we have nothing to worry about?
July 23, 2020
Solve this simple problem and be the next cyber billionaire
Password security is broken as passwords are ‘static’ and easy prey for hackers to capture, crack and re-use, sell on the Dark Web etc. The better alternative is clearly one-time passcodes (OTPs) which change every time. But sending them by text also appears to be broken, due to SIM fraud/swapping. How can you convey OTPs to users in a better, more secure way?

Ready to implement password-free seamless authentication?

get in touch