Keep in mind this tech requires you to have both a pc and a mobile of some kind. Not everyone has both.
I think 2FA is a must for the electronic health record system I am working on and getting yubikey’s server (has worked on every system I have tried with it) to run on safe was first on my list of to do’s in making this app something special. I would love to see some of the work already done. Second will be heart rhythm nymi then probably SQRL.
Long term will be an individual’s electrophysiological bio-marker and authenticated by quantum secure.
It looks interesting and has lots of interesting features, but both the Rivertz software and the TPM chips are closed source. This may not be an issue for many, but it would be good to have an open source alternative.
I’m fully aware that not everybody has a mobile & PC, but like @happybeing said it’s better to have multiple methods to login.
Hihi I prefer
1 SQRL, because I got a PC & Mobile and it’s opensourced (No username, no password, no pincode just scan and your logged in.). What you know and have will get you on the SAFE Network, I do realize that this is easier said then done, since the original login method is: Username/Password/Pincode.
2 Yubikey, problem is I don’t have the hardware
3 Nymi, I rather not have closed sourced companies having my biometrics. Don’t get me wrong I love biometrics, but it’s when it’s opensourced and the data is kept on the SAFE Network in my hands.
Multiple methods is good, just so long as it’s not the only method. So many tech companies these days are becoming overly dependent (and pushy) about smartphones. No even if I had a smartphone I would not want to give some giant corporation my phone number just for “verification.”
Good point. They first started out saying they were going to be open source but that all disappeared? I will create an open source project that utilizes that tech.
- Mobile is still hackable. It is the option of “better than nothing”.
- $25 is affordable and quite cost effective considering that it is basically unhackeable.
- I agree, if Nymi was open source it would be quite something.
@MrAnderson Wow that’s great news, I’ll donate €50 to you when the project is finished. These security measures are really needed. Please remind me when the time is @ , I tend to forget things sometimes.
I agree that a mobile is hackable, but imagine having something like Blackphone’s, PrivatOS (opensourced ofcourse), Mranderson’s tech in combination with Rivetz. I woulden’t necessarily say that that’s supersecured, but it would be the next level in securing a mobile device. BTW I’ll also donated €50 to whoever can create a opensourced PrivatOS with the SAFE Network preinstalled.
I even wanted to go to extreme and create an opensourced solarpowered E ink phone
I’m still that I didn’t get enough support on Quirky to get it done, but imagine a phone like this with the SAFE Network preinstalled. If there are any hardware hackers here, please help me! (I can buy the parts, you can put them together end result we can make SAFEcoins, because a product like this can only be bought in SAFEcoins (but we all know the reason why, promotion, promotion of the SAFE Network)). This phone could be sold like the Fairphone business model (Let people pay for the phone, when you got enough money you can release a batch). We could make a killing with a product like this, because although the Blackphone can be considered the most secured phone, it’s expensive.
@MrAnderson
A safety mechanism would also be helpfull/save lives, for instance if somebody force you to login to the SAFE Network. Let’s say when the system detects “fear” (elevated heart rate) it login to some bogus files of you on the SAFE Network or just say that your not a user of the SAFE Network.
There will probably be a future in which even your heartbeat could be mimicked, but then you could just add layers of access (irus scan, fingerprint, voice command).
So that you can unknowingly spend 1283 SAFE while watching soccer.
One thing that is fairly easy to do is for us to provide the ability to set up a ghost account. So say you reverse the PIN or have anther pin and use that (or password etc.) Your primary session will update that session but exclude certain files/emails etc. that you have filtered.
If you have to give up your account nobody could tell if it’s a shadow account or primary, As it’s a shadow it looks freshly updated