It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Google Experiments with a Ring that Acts as Your Password

page: 1

log in


posted on Mar, 15 2013 @ 06:31 AM
Greetings, ATS!

This article reminds me of the line from the Lord of the Rings:

One Ring to Rule them all One Ring to Find them One Ring to bring them all And in the darknes...bind them

Apparently, Google is experimenting with a "ring" that will replace the need for passwords.

At the RSA security conference in San Francisco last month, Mayank Upadhyay, a principal engineer at Google who specializes in security, became the first person at Google to speak in public about that research. He said that using personal hardware to log in would remove the dangers of people reusing passwords or writing them down. He also thought people would feel some familiarity with the approach. “Everyone is familiar with an ATM. What if you could use the same experience with a computer?”

The ring would actually be a slim USB device that would perform an encrypted transaction with an online computer to validate the user.

The benefits would be obvious: no more forgotten passwords, writing down passwords or, if you're like a majority of folks, using one password for multiple sites.

The downfall is obvious, as well.....what if your key is stolen or lost?

Seeing as how this is a conspiracy site, I'd like to take the concerns a step further.

From Discovery News

Here’s how it would work. Let’s say you want to access your checking account information from your bank’s website. First, you must register your cryptographic key with the bank. That would involve inserting the USB drive into your computer, logging onto the bank’s website and walking through a couple of authentication prompts, similar to how creating a new account works already. During this process, two software keys get generated: one public and one private. The public key gets sent to the bank’s website for use later. The other remains stored on the USB drive.

I'm not a computer expert, but is there potential for the encrypted "public" key to be used somehow for nefarious reasons? I'm thinking collection of sites visited (which I know already happens) or even a way to steal the password? Is it even possible?

What do you think, ATS? Is this the next evolution in computer technology, or something to stay away from?

Happy Friday to all,


posted on Mar, 15 2013 @ 06:37 AM

Originally posted by smyleegrl

One Ring to Rule them all One Ring to Find them One Ring to bring them all And in the darknes...bind them

and in the darkness, search for porn hehehe

I quite like the idea of physical security, with enough know how and data, just about anything can be 'hacked', anything that prevents it, is a step forward in my opinion.

however, ring, eye ball, whatever, if its cloned perfectly surly would still be susceptible to the same hacking?
edit on 15-3-2013 by Biigs because: (no reason given)

posted on Mar, 15 2013 @ 06:40 AM
Public key systems have been in use for years and theres nothing about the public key that can be used to guess the private key so you could quite merrily send it to the NSA with a pretty bow attached around it instead of to the bank

it sounds like a fun toy really to make a bit of news headlines but in itself its nothing special other than its a wearable usb drive with some codes embedded in them and the theft angle would be its main failing

posted on Mar, 15 2013 @ 06:49 AM
reply to post by Maxatoria

That's the state of tech today. Take something that has been around for a very long time and package it in such a way that every slob on the street with disposable income can access it.

Dell did the same thing with those Android stick computers that have been around for a couple of years now. They just polished it up, slapped a Dell sticker on it and sold it for five times what it's worth. The tech rags called it an innovation.

posted on Mar, 15 2013 @ 07:29 AM
So it's basically some form of glorified RSA token? My main concern isn't the public key being exposed (it's public, it's allowed to be exposed), my concern is the "rings" becoming prime targets for criminals. Steal someones ring and you've got their entire identity in your hands to do with as you wish...

posted on Mar, 15 2013 @ 07:56 AM
yeah, its just putting existing tech in somthing thats far easier to carry and use.

This reminded me of a cool story about the london underground train network.

You can buy tickets to get past gates to your trains, or if you are a regular user, you can get a "oyster card" which is like a pre-paid credit card, you top it up and "bleep" it on a radio pad on the gates to the trains and when you get off the train and 'bleep' yourself out of the gate the other end, it charges the card for your journey - very convenient.

Well some guy had a genius idea to make his morning commute far cooler - he pulled the radio chip out of his card and put it in the end of a magicians magic wand - so when he gets to the gates he waves his wand over the radio pad and the gates open!!! How cool is that

If i used the underground more, id do the same thing only with a skin colored glove, so i could "jedi mind trick" open the gates instead and confuse any onlookers

Who says boring technology has to be so boring

edit on 15-3-2013 by Biigs because: (no reason given)

posted on Mar, 15 2013 @ 08:10 AM
Surface tattoos
Micro chips
Gosh I'm glad I don't adorn my body

posted on Mar, 15 2013 @ 08:14 AM
reply to post by thisguyrighthere

This is why I love you guys. I'm a computer idiot. I thought this was something brand new.

Learn something every day....

new topics

top topics


log in