End-user Computer Security/Main content/Mind-reading attacks
End-user Computer Security
Inexpensive security
for |
⦾ individuals |
|
Mind-reading powers may at first appear to you as something confined only to the realm of science fiction and fantasy. However, technology has now advanced so much that it is now literally possible to read the minds of others (using technology), as is evident from the Wikipedia page on brain-reading.
It is left up to the reader to decide whether the psychics described to us in fiction, exist at all in reality. However, you should consider the principle that dictates that, if there is a chance that they do exist, then it may well be prudent mitigating against such risk, even if in reality such risk does not exist. Also, it’s worthwhile to consider that phenomena such as levitation that was previously associated with the miraculous, now can possibly be explained away using the discovered scientific phenomena of invisible forces such as those involved in magnetism, electric fields, etc.
Please refer to the earlier section entitled "Psychic spying of password", for information on mind-reading attacks related to the psychic spying of passwords, and on how they can be overcome.
‘Inception’ styled attacks[edit | edit source] |
|
Psychic attacks may take the form of trying to crack passwords and security credentials by entering one's dreams (like the film “Inception”). To mitigate against this security risk, it may in fact be preferable not to memorise passwords. It might be better to store them in computer files or on paper, and then only call them to mind when entering them. Also, the use of security tokens (such as USB security tokens[1]) as well as the use of password encryption, can overcome such psychic attacks.
Footnotes
- ↑ Some information on certain USB security tokens is contained in the earlier section entitled “Tokens for keys”.
Chapter 5 Some measures that are primarily physical |
Chapter 7 Simple security measures |
- Book:End-user Computer Security/Hash-tagged/#Security credentials
- Book:End-user Computer Security/Hash-tagged
- Book:End-user Computer Security
- Book:End-user Computer Security/Hash-tagged/#Security credentials/#Passwords
- Book:End-user Computer Security/Hash-tagged/#Privacy/#Mental privacy
- Book:End-user Computer Security/Hash-tagged/#Privacy
- Book:End-user Computer Security/Hash-tagged/#Digital cryptography/#Hardware tokens
- Book:End-user Computer Security/Hash-tagged/#Digital cryptography
- Book:End-user Computer Security/Hash-tagged/#Digital storage
- Book:End-user Computer Security/Book part/Main content/Chapters/«Mind-reading attacks», chapter 6
- Book:End-user Computer Security/Book part/Main content/Chapters
- Book:End-user Computer Security/Book part/Main content
- Book:End-user Computer Security/Book part
- Book:End-user Computer Security/Hash-tagged/#Mind-reading
- Book:End-user Computer Security/Hash-tagged/#Simple security measures
- Book:End-user Computer Security/Hash-tagged/#Security credentials/#Security token