In pursuit of the perfect Authenticator
Reliably verifying claimed Identity in digital world is hard. This post discusses evolution of authenticator and why it is hard to build a perfect authenticator.
Reliably verifying claimed Identity in digital world is hard. This post discusses evolution of authenticator and why it is hard to build a perfect authenticator.
This post is from my series of short essays on cybersecurity. CIA – Confidentiality, Integrity, and Availability – is a …