Opportunities and Obstacles of Zero Login





Everyone is aware that passwords are not completely secure in the present world. Merely having a password for security does little to minimize the risks. Moreover, with brute force attacking tactics, login credentials can be easily hacked. A while ago, My Fitness Pal application became a victim to data breach when hackers stole passwords of over 150 million clients.

Events like these keep happening and reminding us that we need something stronger than a password, something that is more secure.  What might that be? Zero login. It is an idea which will revolutionize authentication in coming time. A number of people have started using multi-factor authentication with biometrics which uses fingerprint, iris, and face recognition. Zero login is more advanced and takes technology up ten notches.

What is Zero Login?
Zero login technology needs a thorough reconsideration and restructuring of the identity system. One can no longer rely on the old-school authentication method- password.
Zero login basically ascribes to the concept that one will not need to enter passwords or produce documentation to authenticate themselves. The gadgets will be advanced and safe enough to immediately validate users by their characteristics, sound, and their movements and different unique identifiable attributes.

The pros of Zero Login
Moving ahead of facial recognition and fingerprint scanning, online retail giant Amazon is already coming up with new technologies for its consumer's authentication based on their typewriting pace, their phone tapping patterns, etc.

With the help of such zero login technology, the gadget will be capable of identifying the user's individual and elaborate behavioral patterns that no cyber criminal can steal.
The gadget will also be able to recognize the user with the help of interconnected devices.
It could be a bit surprising to find out that zero login technology has been adopted in a few places. For example, when a user logs into their internet banking account using a phone they have not used to access their bank account before, they will get notified by a text from the bank asking them to authenticate and verify whether the user made the latest login attempt. Such a feature has been available for a long while, and it might have lead the inception of this upcoming authentication revolution.

New iPhone versions let users modify the pressure of the home button. They are also capable of identifying and retaining signals from interconnected devices. Even if a hacker tries to compromise one device, it will be hard for the hacker to penetrate all the inter-connected devices. Unity is strength maxim could not be any less apt here.

The Obstacles faced
Even though zero login has many advantages, it also is laced with an array of flaws and defects. For example, is there a way for the user to know when they have signed out of an account? Also, how securely will the behavioral patterns be stored? Also, how will a user get to know when and if they are being discreetly observed?

Lastly, the right approach regarding controlling any authentication method is to have the application run on the device locally, and the risk score should be transferred to the cloud.

James Thomas is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at www.norton.com/setup 

Comments