1 reply
0 recast
2 reactions
1 reply
0 recast
0 reaction
1 reply
0 recast
0 reaction
1 reply
0 recast
0 reaction
1 reply
0 recast
0 reaction
1 reply
0 recast
0 reaction
The authentication methods can be in your mind, or you can write them physically or digitally encrypted.
Even if someone somehow knows your authentication methods, it does not guarantee that they will be the same in the future, and they just know how you authenticate, not the devices or identifiers you use.
If they get hold of all the identifiers, they still won't own your identity because you can default to social recovery. Here, we can use our society—family, friends, colleagues, colleges, workplaces—as our identifier, allowing us to migrate our identity easily.
1 reply
0 recast
0 reaction
0 reply
0 recast
0 reaction