Home Two-Factor Authentication Is For Wusses, Get A Tattoo

Two-Factor Authentication Is For Wusses, Get A Tattoo

Think you’re all bad-ass with your two-factor authentication and 40-character passwords? If Motorola’s vision of the future comes to pass, that kind of security is for wusses.

In a conversation at All Things D’s D:11 conference this week, Motorola Mobility’s head of advanced technology and projects group Regina Dugan lamented the fact that for all of the technological advances that we have made over the decades, we are still relying on outmoded password-based authentication, the kind the guys in the lab coats were using back in the day.

And we’re doing it a lot. Dugan speculated that power users would have to authenticate themselves nearly a hundred times a day.

(See also Two-Factor Authorization Is Awesome – Until You Lose the Damn Token.)

Dugan presented two options for better ways to securely access information in the near future: tattoos and “authentication vitamins.”

The electronic tattoo, which Dugan demonstrated on stage at the conference, are biostamps made by the firm MC10, which can be used by healthcare professionals to monitor a patient’s vital signs. In a medical context, these tattoos, which are thin and stretchable, could be implanted within the body to monitor conditions like irregular heartbeats or brain activity.

The technology, Dugan explained, can also be used as an authentication tool, worn right on the user’s skin.

Ink not your thing? Dugan pulled out another conceptual idea: a small pill-like device that, when swallowed, would turn your whole body into a authentication device.

The device runs “like a reverse potato battery,” Dugan explained, pulling power from the acids in your stomach to generate an 18-bit authentication signal from the embedded chip inside. The pill has reportedly been approved already by the U.S. Food and Drug Administration.

Motorola seems to be taking a shortcut to the coveted holy grail of pure biometric identification with these interim bio/tech hybridized tools. The more technology that an authentication system employs, however, the bigger the more chance it can be hacked.

That said, tattoos and pills are a pretty interesting place to move the authentication conversation.

Image courtesy AllThingsD.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.