Rethinking Authentication: A Two-Card Distributed Security Model
dev.to·3d·
Discuss: DEV
🔐Zero Trust
Preview
Report Post

This model does not rely on cryptography or computational hardness. It relies on physical and structural separation.

What do you think about the current situation where everything is concentrated in a single smartphone?

Modern smartphones have a structure in which identity, authority, and private keys are all concentrated in one device for authentication. As a result, if a single smartphone is compromised or lost, everything is lost. Putting everything into one smartphone is not necessarily bad. Because it is convenient. However, I want you to think about security.

- Can the loss of one smartphone really be compensated easily? - Is the information that is lost or stolen really that insignificant?

I think this way: A structure where one loss leads to total loss is…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help