{"id":58824,"date":"2014-08-19T20:30:37","date_gmt":"2014-08-20T00:30:37","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2023-05-17T12:41:38","modified_gmt":"2023-05-17T16:41:38","slug":"password-free-future","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/password-free-future\/","title":{"rendered":"Password Free Future"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20160429011205\/http:\/\/crypto.junod.info\/2012\/06\/14\/passwords-storage-in-a-nutshell\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Password Free Future\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/password1.jpg?resize=83%2C55\" alt=\"Password Free Future\" width=\"83\" height=\"55\" \/><\/a>Let&#8217;s just admit it, <strong>passwords suck<\/strong>, people don&#8217;t use <a title=\"Password Insecurity\" href=\"http:\/\/wp.me\/p2wgaW-uw\" target=\"_blank\" rel=\"noopener noreferrer\">good passwords<\/a>. Password breaches seem to be the new normal. This new normal is forcing firms to find new ways of verifying their users and securing their data. Now, security firm <a title=\"Trustwave\" href=\"https:\/\/www.trustwave.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trustwave<\/a> says <strong>traditional password policies are useless<\/strong>.<\/p>\n<p>According to an <a title=\" Longer Passwords are Harder to Crack says Trustwave\" href=\"http:\/\/www.infosecurity-magazine.com\/news\/longer-password-harder-to-crack\/\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a><a href=\"http:\/\/www.infosecurity-magazine.com\/news\/longer-password-harder-to-crack\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Longer passwords are more secure\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/windows-8-stores-logon-passwords-in-plain-text.jpg?resize=116%2C77\" alt=\"Longer passwords are more secure\" width=\"116\" height=\"77\" \/><\/a> at <em><a title=\"Infosecurity Magazine\" href=\"http:\/\/www.infosecurity-magazine.com\" target=\"_blank\" rel=\"noopener noreferrer\">Infosecurity Magazine<\/a><\/em> the <a title=\"Chicago\" href=\"http:\/\/www.cityofchicago.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Chicago-based<\/a> firm says mixing upper and lower case letters, numbers and special characters don\u2019t make passwords any harder for hackers to crack, <strong>only increasing the number of characters makes passwords more secure<\/strong>. Will we end up with 1,024 character secure passwords. I say let&#8217;s ditch passwords altogether.<\/p>\n<p><a href=\"https:\/\/www.businessinsider.in\/chart-of-the-day-the-worst-data-breaches-ever\/articleshow\/39778337.cms\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"Business Insider - The Worst Company Data Breaches Ever\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/20140806-compromised-data-1.jpg?resize=480%2C360\" alt=\"Business Insider - The Worst Company Data Breaches Ever\" width=\"480\" height=\"360\" \/><\/a><\/p>\n<p>What else can we use to secure our IDs? <a title=\"John Hawes\" href=\"http:\/\/nakedsecurity.sophos.com\/author\/johnhawes\/\" target=\"_blank\" rel=\"noopener noreferrer\">John Hawes<\/a> at <a title=\"Sophos\" href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> <em><a title=\"Naked Secuity Blog\" href=\"http:\/\/nakedsecurity.sophos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Naked Security Blog<\/a><\/em> recently <a title=\"http:\/\/www.infosecurity-magazine.com\/news\/longer-password-harder-to-crack\/\" href=\"http:\/\/nakedsecurity.sophos.com\/2013\/09\/04\/faces-gestures-heartbeats-how-will-the-passwords-of-the-future-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">bemoaned<\/a> the state of the clunky, fiddly, and mostly rather insecure passwords we use for almost all of our authentication needs. He says we may not be stuck with passwords forever. He offers some future options.<\/p>\n<h3>You are the proof<\/h3>\n<p><strong><a href=\"http:\/\/hothardware.com\/News\/ElcomSofts-Internet-Password-Breakers-Scares-the-Crap-Out-of-Us\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Password dog\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/password_dog.jpg?resize=146%2C109\" alt=\"Password dog\" width=\"146\" height=\"109\" \/><\/a>Facial Recognition<\/strong> &#8211; The author cites <a title=\"Australia\" href=\"http:\/\/maps.google.com\/maps?ll=-35.308,149.1245&amp;spn=10.0,10.0&amp;q=-35.308,149.1245 (Australia)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Australian<\/a> researchers who have been promoting facial recognition as a means of authentication. This idea seems obvious, faces are the main way people identify each other in the real world, so it makes sense to have computers recognize our faces, or at least <a title=\"Apple To Make Passwords Obsolete With New Face Recognition Patent\" href=\"http:\/\/www.forbes.com\/sites\/greatspeculations\/2012\/01\/03\/apple-to-make-passwords-obsolete-with-new-facial-recognition-patent\/\" target=\"_blank\" rel=\"noopener noreferrer\">bits of our faces<\/a>. The Sophos article says the approach has become common of late, with PC login systems and mobile apps trying to use our faces to authenticate us to various things. There is even a Finnish company that plans to use <a title=\"http:\/\/www.huffingtonpost.com\/2013\/07\/19\/facial-recognition-credit-card_n_3624752.html\" href=\"http:\/\/www.huffingtonpost.com\/2013\/07\/19\/facial-recognition-credit-card_n_3624752.html\" target=\"_blank\" rel=\"noopener noreferrer\">faces in place of credit cards<\/a>.<\/p>\n<p>The anti-malware firm says <a title=\"Facial recognition system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Facial_recognition_system\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">facial recognition systems<\/a> have proven less than perfect, either <a title=\"Vietnamese security firm: Your face is easy to fake\" href=\"http:\/\/www.cnet.com\/news\/vietnamese-security-firm-your-face-is-easy-to-fake\/\" target=\"_blank\" rel=\"noopener noreferrer\">easily fooled<\/a> by photos, similar-looking people, or technical tricks, or failing to authenticate real users thanks to bad hair days or bad moods affecting how we look.<\/p>\n<p><a href=\"http:\/\/www.globalnerdy.com\/2009\/04\/12\/colin-bowern-at-the-metro-toronto-net-user-group-authentication-alternatives-for-aspnet\/\" target=\"_blank\" rel=\"passwords are like noopener pants noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/passwords-are-like-pants-thumb.jpg?resize=152%2C114\" alt=\"Passwords are like pants\" width=\"152\" height=\"114\" \/><\/a>Mr. Hawes says <a title=\"University of Queensland\" href=\"http:\/\/uq.edu.au\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">University of Queensland<\/a> researchers are trying to improve the accuracy and security of facial recognition. The Aussies are working to be able to get facial recognition to work from a single initial still image and from different angles and different lighting conditions, which sounds like a must for any decent recognition system.<\/p>\n<p>The good thing about face recognition, the author says is that it&#8217;s relatively low-tech, using a standard part (the rear-facing camera) of most of the devices we use.\u00a0The software looks for<strong> patterns on the human face<\/strong>, such as distance between eyes, to identify people. But the researchers expect it will take more time to have a fool-proof working prototype.<\/p>\n<p><a href=\"https:\/\/www.omicsonline.org\/open-access\/a-new-approach-towards-biometric-authentication-system-in-palm-vein-domain-2277-1891-1000104.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Facial recognition\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/novel-face-recognition-347365-18820_140x140.jpg?resize=127%2C127\" alt=\"Facial recognition\" width=\"127\" height=\"127\" \/><\/a><a title=\"CNN\" href=\"http:\/\/www.cnn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CNN<\/em><\/a> <a title=\"5 biometric alternatives to the password\" href=\"http:\/\/www.cnn.com\/2014\/04\/04\/tech\/innovation\/5-biometrics-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">points out<\/a> that security is great for consumers, but it&#8217;s not the primary goal of most facial recognition tools. <strong>Law enforcement<\/strong> and <a title=\"NSA Intercepts Millions Of Photos For Massive Facial Recognition Database\" href=\"http:\/\/www.businessinsider.com\/nsa-facial-recognition-2014-5\" target=\"_blank\" rel=\"noopener noreferrer\">spies<\/a> are<strong> <a href=\"http:\/\/www.planetbiometrics.com\/creo_files\/upload\/article-files\/whitepaper_facial_recognition_morphotrust.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">building databases<\/a><\/strong> (PDF) to take advantage of recent advancements in facial recognition. Identifying one person using their trail of selfies left online and in surveillance footage from stores could be a huge business. Some stores already use facial recognition to build profiles on repeat customers and collect data about how they shop.<\/p>\n<p><a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> (<a title=\"NASDAQ : FB\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"noopener noreferrer\">FB<\/a>)\u00a0recently bragged that its own facial recognition project named <a href=\"https:\/\/web.archive.org\/web\/20140928185521\/http:\/\/money.cnn.com:80\/news\/newsfeeds\/gigaom\/articles\/2014_03_18_facebook_shows_off_its_deep_learning_skills_with_deepface.html\" target=\"_blank\" rel=\"noopener noreferrer\">DeepFace<\/a>\u00a0was almost as accurate at detecting people as the human brain. More recently, <a title=\"Facebook's new face recognition knows you from the side\" href=\"http:\/\/money.cnn.com\/2014\/04\/04\/technology\/innovation\/facebook-facial-recognition\/\" target=\"_blank\" rel=\"noopener noreferrer\">it also claimed to be able to recognize faces from the side<\/a> as well as the front.<\/p>\n<p><strong><a href=\"http:\/\/www.cnn.com\/2014\/04\/04\/tech\/innovation\/5-biometrics-future\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Ears as a password\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/140404162453-human-ear-story-body1.jpg?resize=158%2C89\" alt=\"Ears as a password\" width=\"158\" height=\"89\" \/><\/a>Ears &#8211;<\/strong><em> CNN<\/em> reports that with the right software, a phone can detect the shape of a human ear and use it to log in. That&#8217;s the idea behind the <a title=\"DESCARTES BIOMETRICS \" href=\"http:\/\/ergo.descartesbiometrics.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ergo Android app <\/a>by <a title=\"Descartes Biometrics\" href=\"http:\/\/descartesbiometrics.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Descartes Biometrics<\/a>. When an <strong>ear is pressed against the screen<\/strong>, the points where it makes contact with the glass are mapped out and <strong>compared to a stored ear print<\/strong>. If it matches, the user is authenticated. The app is adjustable and can require multiple scans for the highest levels of security.<\/p>\n<p>For now, it&#8217;s limited to unlocking a phone. But <em>CNN<\/em> claims ear prints could be used to identify people for any number of uses on the phone, such as making purchases in app stores or signing into services.<\/p>\n<p><strong>Walking<\/strong> &#8211; <em>CNN<\/em> says that if you&#8217;ve ever identified someone by how listening to how they walk down the hall, you&#8217;ve already seen the power of <strong>gait recognition<\/strong>. For 30 years, researchers have tinkered with gait-recognition technology but the recent boom in inexpensive motion sensors like accelerometers and gyros have given new life to the field. <em>CNN<\/em> reports that with the right software and sensors, they should be able to analyze a person&#8217;s walk. A wearable fitness device or smartphone can act as a password to authorize users.<\/p>\n<p>The benefit of gait recognition is that it can gather the necessary information in the background while people go about their normal routines. There&#8217;s no need for the subject to touch their device or look into a camera.<\/p>\n<h3>Things you do are proof<\/h3>\n<p><strong><a href=\"http:\/\/nypost.com\/2013\/02\/10\/forget-passwords-next-gen-id-eyed\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Keystroke biometrics\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2016\/03\/password_art-300x300.jpg?resize=117%2C117\" alt=\"Keystroke biometrics\" width=\"117\" height=\"117\" \/><\/a>Typing &#8211;<\/strong> Like walking, typing varies from person to person according to <em>CNN<\/em>. <strong>Keystroke biometrics<\/strong> record how a person types and calculates their <strong>unique pattern, speed, and rhythm<\/strong>. It determines how long they hold down each key and the space of time between different letters. Keystrokes could be used to authenticate anyone working on a computer. This system could appeal to companies that are watching out for unauthorized users on their internal systems.<\/p>\n<p><strong>Gestures &#8211;<\/strong> Gesture-based authentication is another potential password replacement emerging from the world of smartphones and tablets. Mr. Hawes says hand movements repeated often enough can lead to <b>muscle memory<\/b>, so quite complex patterns can become quite easy to reliably and accurately reproduce. This is the basis of a very venerable form of authentication, the <strong>signature<\/strong>. It should be harder to compromise though, as, unlike signatures,\u00a0 swipes leave few traces to be copied.<\/p>\n<p>An<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"swipe-pattern\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/basic-switch-views.png?resize=98%2C95\" alt=\"swipe-pattern\" width=\"98\" height=\"95\" \/>droid phones have long had swipe-pattern unlock features, and <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) Windows 8 includes a system based on a few swipes around a picture. Research has <a title=\"Windows 8 picture passwords are really easy to crack, study shows\" href=\"http:\/\/www.techradar.com\/news\/software\/security-software\/windows-8-picture-passwords-are-really-easy-to-crack-study-shows-1177345\" target=\"_blank\" rel=\"noopener noreferrer\">poked some serious holes<\/a> in this approach though, showing that people are just as bad at picking hard-to-guess shapes as they are at choosing passwords.<\/p>\n<p>Besides monitoring your body to authenticate you, there are hybrid authentication technologies. <strong>Hybrid authentication<\/strong> combines biometric factors with other techs.<\/p>\n<p><strong><a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/i-think-therefore-i-login\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100029 size-thumbnail\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mind_reading_hat.jpg?resize=75%2C75&#038;ssl=1\" alt=\"\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mind_reading_hat.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mind_reading_hat.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mind_reading_hat.jpg?w=450&amp;ssl=1 450w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Brain waves &#8211;<\/strong> I <a title=\"I Think Therefore I Login\" href=\"http:\/\/wp.me\/p2wgaW-5Ez\" target=\"_blank\" rel=\"noopener noreferrer\">covered<\/a> the\u00a0<a title=\"Interaxon\" href=\"http:\/\/www.choosemuse.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Interaxon<\/a> Muse headband sensor device a while ago. It is designed to allow users to create a specific<strong> brain wave signature<\/strong> for a password that will never have to be said or typed to log in.<\/p>\n<p><strong>Biostamps &#8211;<\/strong> \u00a0The biostamp idea proposed a hybrid of body and technology. The biostamps are <strong><a title=\"Daily Mail report on biostamps\" href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-2333203\/Moto-X-Motorola-reveals-plans-ink-pills-replace-ALL-passwords.html\" target=\"_blank\" rel=\"noopener noreferrer\">flexible electronic circuits<\/a> attached to the skin<\/strong>, which theoretically can communicate your password wirelessly with any device which needs to check who you are.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"heart rhythms\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2014\/08\/nymi-bracelet-1-537x402.jpg?resize=106%2C79\" alt=\"heart rhythms\" width=\"106\" height=\"79\" \/>Bracelets &#8211;<\/strong> Another hybrid approach uses a <a title=\" Nymi Is A Heartwave-Sensing Wristband That Wants To Replace All Your Passwords &amp; Keys\" href=\"http:\/\/techcrunch.com\/2013\/09\/03\/nymi\/\" target=\"_blank\" rel=\"noopener noreferrer\">bracelet device<\/a> that measures <strong>heart rhythms<\/strong> to check who we are, and then connects to our devices via Bluetooth to pass on that confirmation. I covered Nymi <a href=\"http:\/\/wp.me\/p2wgaW-fiK\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>The actual authentication takes place only when the bracelet is first put on. It requires a quick touch of some sensors, and from then on it will confirm you&#8217;re you until it&#8217;s removed. It includes motion sensors, so the basic authentication can also be combined with movements and gestures to create multi-factor passwords, using both the body and the mind of the attached user. Gestures could be used to unlock cars, for example.<\/p>\n<p>Over the years the password systems we use have seen various improvements, both in usability (ranging from simple but today&#8217;s indispensable systems for replacing forgotten passwords to the latest secure password management utilities) and security, for example, two-factor authentication schemes using dongles or smartphones combined with our computers.<\/p>\n<p>All have helped in some ways, but have also introduced further opportunities for insecurity &#8211; recovery systems can be <a href=\"http:\/\/www.theverge.com\/2013\/3\/22\/4136242\/major-security-hole-allows-apple-id-passwords-reset-with-email-date-of-birth\" target=\"_blank\" rel=\"noopener noreferrer\">tricked<\/a>, management tools can have <a href=\"http:\/\/nakedsecurity.sophos.com\/2013\/08\/18\/lastpass-password-manager-gets-security-patch-against-password-leakage-bug\/\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerabilities<\/a> or simply be <a href=\"http:\/\/nakedsecurity.sophos.com\/2013\/08\/08\/chrome-firefox-display-plain-text-passwords-with-a-few-clicks\/\" target=\"_blank\" rel=\"noopener noreferrer\">insecurely designed<\/a>, and two-factor approaches can be defeated by <a href=\"https:\/\/news.softpedia.com\/news\/Man-in-the-Mobile-Attacks-Target-the-Bank-Accounts-of-Android-Users-280391.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">man-in-the-mobile<\/a> techniques.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Biometrics are not bullet-proof. They have a number of problems still. <\/em><\/p>\n<ol>\n<li><em>Biometric data cannot be changed once it is compromised. <\/em><\/li>\n<li><em>Will stress, fitness, or aging, have on the physiological elements of biometrics<\/em>.<\/li>\n<li><em>Cost, most of these techniques require new equipment.<\/em><\/li>\n<li><em>They all need connectivity, Bluetooth connectivity.<\/em><\/li>\n<li><em>Biometric data still needs to be stored somewhere. And that would be an attractive target for attackers.<\/em><\/li>\n<\/ol>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/securitywatch.pcmag.com\/hacking\/326374-make-passwords-strong-and-long\" target=\"_blank\" rel=\"noopener noreferrer\">Make Passwords Strong And Long<\/a> (securitywatch.pcmag.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your password could be replaced by technologies like Biometrics, Facial recognition, Brain waves, Heart beats, Ears, Gestures, Gait, Biostamps, or Bracelets<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,1452,2228,104,2227,1096,536,92,2229,23,2541,4,281,2224],"class_list":["post-58824","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-biometrics","tag-brain-waves","tag-facebook","tag-facial-recognition","tag-fb","tag-goog","tag-google","tag-heart-beat","tag-malware","tag-passwords","tag-security","tag-sophos","tag-trustwave"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=58824"}],"version-history":[{"count":17,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58824\/revisions"}],"predecessor-version":[{"id":130953,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58824\/revisions\/130953"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=58824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=58824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=58824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}