passwords! (p4)

brian carroll electromagnetize at gmail.com
Tue Nov 12 19:35:15 PST 2013


completeness is its own thing...

need to mention case of 'partial passwords' where user
and site merge into a final password yet the user password
cannot be cracked without the hidden variables blended into
the final working password that is either static or changing...

for instance, a previous example...

     [морд][3][માટે][.][for][-]...[جو][4][iconID][cibé]

what if [iconID] was hidden as to its bit-set size, it could be
1 character space or twelve, and yet it would remain hidden
at password entry by the user yet required to gain access.

     [морд][#][3][###][માટે][.][for][##][-]...[جو][4][##][cibé][#]

such that some algorithm processes the input in another
framework and if somehow this is processes is not normal
or it triggers a particular mechanism, a threshold condition
could activate blocking access within the password itself

vague, i do not know exactly how it could be engineered
such that it would be needed and unseen by the user and
yet be able to distinguish the actual user from imitator or
hostile attacker, though in this way, the moat/drawbridge
mechanism that would be 'missing information' within the
structure of the password, such that the STRING in itself,
input by the user, is not the password, until it is mixed in
with the other piece via the site security.

     [#|#|x|ம்|7|#|#|#|ன்]

in other words, a password could only be partially that of
the user, and perhaps this is already how it exists today,
though that each variable could be more than a character
and this could be a bit-set computation, as an icon/other
coordinates are blended together, some data of which is
not in the user domain and would remain unknown and
beyond the ordinary boundary, inside a further interior
realm of protected data, a second security vestibule,
in the above case, all the wildcards could be data that
is in the password yet zoned for another level of access,
such that the administrators must provide the data else
that it could also be variable in size and 'timing', such
that real-time or other permutive functioning could be
rolling, 'living code' that is masked - "unknown", and
potentially has a calculative or image-based input that
is not visible on the outside, yet also entangled with it.

perhaps it is not of classical physics, this, yet why
must the password unit be assumed a single static
character and not something in movement, existing
beyond perception and operating by unknown rules
that influences what the actual password is, at any
given point or place in time. unique perspective as
the basis for a universal security approach (UID)


lime, tequila, [#], triple-sec




More information about the cypherpunks mailing list