{"id":5836,"date":"2021-01-03T13:22:58","date_gmt":"2021-01-03T13:22:58","guid":{"rendered":"http:\/\/authtake.com\/?p=5836"},"modified":"2021-05-26T12:23:59","modified_gmt":"2021-05-26T12:23:59","slug":"the-evolution-process-of-passwords-from-past-to-today","status":"publish","type":"post","link":"https:\/\/authtake.com\/tr\/the-evolution-process-of-passwords-from-past-to-today\/","title":{"rendered":"Ge\u00e7mi\u015ften G\u00fcn\u00fcm\u00fcze Parolalar\u0131n Evrim S\u00fcreci"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5836\" class=\"elementor elementor-5836\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d3b4c12 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"5d3b4c12\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f6e46\" data-id=\"2f6e46\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39ff2fe3 elementor-widget elementor-widget-text-editor\" data-id=\"39ff2fe3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><!-- wp:paragraph {\"fontSize\":\"huge\"} --><!-- \/wp:paragraph -->\n\n<!-- wp:paragraph --><!-- \/wp:paragraph -->\n\n<!-- wp:paragraph --><\/p>\n<p>Have you ever thought about the history of passwords and the reasons for their creation? As mentioned in the name of passwords, &#8216;pass&#8217; and &#8216;word&#8217; are secret words that only some people use to do a job known to them or to enter somewhere. These words were so useful that they survived until today.<\/p>\n<p>In our digitalizing world, we started to use passwords to ensure the security of our accounts. Our for decades passwords have become our most trusted friends. Later, we saw that passwords evolved into secrets that more than one person knew or could learn at any moment, just like the old primitive forms.<span style=\"letter-spacing: 0px;\">\u00a0At this very moment, 2FA was developed. The goal was to keep our passwords secret, to prevent third parties from accessing our accounts only with passwords, even if we could not keep them secret. For example, banks preferred to do this with OTP (One Time Password) for a long time. Knowing the password in our mobile banking transactions was not enough for us to enter our account, and we also had to enter the password sent to us into the system. For identity thieves, this has been an incredible blow. We thought that there was nothing they could do to steal our accounts anymore, until we learned that the SMSs sent to us could be captured by spyware that can be installed on our phones or by tracking them on the networks we are on. However, we have seen that we can no longer trust the OTP as a result of financial losses that we faced. We realized that we cannot perform the identity verification process with a code or an e-mail sent to us. None of these methods could secure our identity and could be stolen. The only thing that could not be stolen was our selves.\u00a0<\/span><\/p>\n<p><span style=\"letter-spacing: 0px;\">Our unique face and fingerprint could save us from this problem. So with the developed MFA, we now authenticate with fingerprint and face recognition. Time and location verification features have been added to improve and perfect MFA. We started to do all our transactions with MFA. It is one of the most used authentication methods today. But human beings have always wanted to be able to find the better and do it more easily. This is the source of all technological developments today.\u00a0<\/span><\/p>\n<p><span style=\"letter-spacing: 0px;\">Humanity&#8217;s search for more has led to the beginning of the belief that the MFA still does not provide enough secure validation. I&#8217;m sure you asked why such a perfect system was not considered sufficient. The answer is that; The passwords used in MFA are still the weakest link in the chain. When the password is stolen, it opens the way to pass other security steps. Long and complex passwords that are created to prevent theft of passwords, however important they are for our security, do not offer us the convenience we seek because they are very difficult to remember. Writing long and complex passwords somewhere is the worst move we can do. If you think the problem will be solved once we find the password that is perfectly difficult and memorable, there is something we should tell you; passwords have to be changed after a certain period of time. The reason is still the same. The risk of our passwords being learned or seized by hackers. In addition, we have to set a separate password for each account, otherwise, capturing an account&#8217;s password means capturing all other accounts. We haven&#8217;t even begun to talk about the costs required to reset our passwords when we forget them.<\/span><\/p>\n<p><span style=\"letter-spacing: 0px;\">If you say, all right this is sufficiently overwhelming, we think the same. We are overwhelmed with all this burden. Why not we use the best, easiest, safest and latest solution? Since we could not find an answer to this question, we started using the best, easiest, safest and latest solution and made it available all over the world. What are we talking about? Of course, we are talking about passwordless authentication. Passwordless authentication is the latest system that offers the most reliable and easiest service to its users.<\/span><\/p>\n<a style=\"text-decoration: underline; color: blue;\" href=\"https:\/\/authtake.com\/tr\/passwordless-mfa\/\">Parolas\u0131z Kimlik Do\u011frulama Hakk\u0131nda Daha Fazla Bilgi<\/a> \n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Have you ever thought about the history of passwords and the reasons for their creation? As mentioned in the name of passwords, &#8216;pass&#8217; and &#8216;word&#8217; are secret words that only some people use to do a job known to them or to enter somewhere. These words were so useful that they survived until today. In our digitalizing world, we started to use passwords to ensure the security of our accounts. Our for decades passwords have become our most trusted friends. Later, we saw that passwords evolved into secrets that more than one person knew or could learn at any moment, just like the old primitive forms.\u00a0At this very moment, 2FA was developed. The goal was to keep our passwords secret, to prevent third parties from accessing our accounts only with passwords, even if we could not keep them secret. For example, banks preferred to do this with OTP (One Time Password) for a long time. Knowing the password in our mobile banking transactions was not enough for us to enter our account, and we also had to enter the password sent to us into the system. For identity thieves, this has been an incredible blow. We thought that there was nothing they could do to steal our accounts anymore, until we learned that the SMSs sent to us could be captured by spyware that can be installed on our phones or by tracking them on the networks we are on. However, we have seen that we can no longer trust the OTP as a result of financial losses that we faced. We realized that we cannot perform the identity verification process with a code or an e-mail sent to us. None of these methods could secure our identity and could be stolen. The only thing that could not be stolen was our selves.\u00a0 Our unique face and fingerprint could save us from this problem. So with the developed MFA, we now authenticate with fingerprint and face recognition. Time and location verification features have been added to improve and perfect MFA. We started to do all our transactions with MFA. It is one of the most used authentication methods today. But human beings have always wanted to be able to find the better and do it more easily. This is the source of all technological developments today.\u00a0 Humanity&#8217;s search for more has led to the beginning of the belief that the MFA still does not provide enough secure validation. I&#8217;m sure you asked why such a perfect system was not considered sufficient. The answer is that; The passwords used in MFA are still the weakest link in the chain. When the password is stolen, it opens the way to pass other security steps. Long and complex passwords that are created to prevent theft of passwords, however important they are for our security, do not offer us the convenience we seek because they are very difficult to remember. Writing long and complex passwords somewhere is the worst move we can do. If you think the problem will be solved once we find the password that is perfectly difficult and memorable, there is something we should tell you; passwords have to be changed after a certain period of time. The reason is still the same. The risk of our passwords being learned or seized by hackers. In addition, we have to set a separate password for each account, otherwise, capturing an account&#8217;s password means capturing all other accounts. We haven&#8217;t even begun to talk about the costs required to reset our passwords when we forget them. If you say, all right this is sufficiently overwhelming, we think the same. We are overwhelmed with all this burden. Why not we use the best, easiest, safest and latest solution? Since we could not find an answer to this question, we started using the best, easiest, safest and latest solution and made it available all over the world. What are we talking about? Of course, we are talking about passwordless authentication. Passwordless authentication is the latest system that offers the most reliable and easiest service to its users. Learn More About Passwordless Authentication<\/p>","protected":false},"author":4,"featured_media":9951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,3,4,5],"tags":[],"_links":{"self":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/5836"}],"collection":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/comments?post=5836"}],"version-history":[{"count":0,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/5836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media\/9951"}],"wp:attachment":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media?parent=5836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/categories?post=5836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/tags?post=5836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}