Bitcoin

Use your cryptocurrency to access websites instead of a password

What better way to celebrate World Password Day (May 7) than with a new Crypto World solution to prevent unsafe passwords and phishing attacks?

The lnurl-auth protocol Allows users to access multiple accounts by receiving a QR code with a special message. In this way, they can use a public key associated with their wallets to get a unique key that is only compatible with the domain they want to access. This key would authenticate that you own the account.

Podcaster Marty Bent said that The system meant that websites no longer had to search for your information in a central database that was prone to hacking:

“You no longer have to remember unique passwords for separate websites. You no longer have to create unique email addresses for different services. You no longer have to worry about the site you’re interacting with to steal your data. You have pure and confident control over your online accounts. No user names, passwords or identifying information other than the public key obtained when registering. “

Tips for the present, not for the future

Use your cryptocurrency to access websites instead of a password
Use your cryptocurrency to access websites instead of a password

You can look forward to this, but until it becomes widespread, you will need to find other ways to keep your passwords secure.

According to a Proofpoint State of the Phish Report survey, e.g.l 44% of respondents in the United States used a password manager – A log in which passwords can be saved and, if necessary, filled out in forms – for your online accounts, which is well above the global average of 23%.

According to Propinpoint’s Crispin Kerr, password managers are the safest option::

“… we discovered so many [usuarios] They reuse passwords frequently or do not change them regularly because password management is impractical. Many also find it difficult to remember the increasingly complex passwords for the variety of online services used today, including access to the company’s intranet, bank accounts, streaming service accounts, government accounts, etc. For these reasons, we strongly recommend a password- Manager. “

While password managers are the most popular method of password protection in the United States, respondents from other countries such as Germany, Australia, France and the United Kingdom were more likely to have to manually enter different passwords each time they connected to an account.

An average of 16% of respondents worldwide stated that they used the same password (or two passwords) for all accounts, which is not “advisable” for safety reasons. “

Improve password strength

Proofpoint also provided tips for people to improve the strength of their passwords, including avoiding personal information such as birth dates, nicknames, and names of friends or family members.. Passwords must be “at least 12 characters long, with two or three different types of characters in unpredictable places” and users should “avoid putting capital letters at the beginning or numbers or symbols at the end”.

If the user is someone with poor password storage, Passport phrases can be a lifesaver. Create a phrase and use the first or second letter of each word as a password. Mix capital letters and numbers as needed. For example:

We can’t eat 15 New York pizzas but these 5 people can (we can’t eat 15 New York pizzas but these 5 people can)
Password: wce15NYpbt5pc

It also protects your WiFi with a password

The more people work from home on their own or newly created Wi-Fi networks that employees may not be familiar with, the greater the likelihood that phishing attacks will occur through fake access portals.

The Proofpoint report found this 95% of global workers already had a Wi-Fi network at home, but only 49% of people protected it with a password. In addition, only 31% changed their router’s default password.

Phishing attackswhether they lure victims into a fake online portal or click a URL in an email, can cause remote agents to “send even the most complex and unique passwords directly to the attacker“”

Do not stop reading:

Similar Posts