said by NoHereNoMo:Well, the best security systems involve a challenge based on (1) something you have (or are) and (2) something you know. The first could be a device or something else to--supposedly--"prove" who you are (retina scan, fingerprint reader ..."ring"?). Of course, the second could still be a password (or PIN). (However, would this actually make your accounts et al "hack-proof"?)
(At least, if the first were in use here, then one might not jump to the conclusion that someone "unavailable" is a "guy"? )
I guess the hard part is how does a biometric device report its scan to the related security package. And could that be man in the middled. aka someone records a legit input and then fools into taking a directly fed data stream.
While the password grows ever weaker as computing grows ever stronger and most people do not use complex passwords because they have to be remembered.
social engineering will likely grow in popularity as a form of hacking. Why brute it when you can gain access right through the side doors.