Editor’s note: Brennen Bryne is the CEO and co-founder of Clef, a company dedicated to building a better digital identity for the internet.
Redefining Identity Security
Clef is a new identity company with the sole purpose of redefining digital authentication and security as we know it.
For digital brands, Clef provides an architecture that distributes user data between paired mobile devices, cloud-based data services and 2048-bit RSA asymmetric key cryptography for maximum identity protection.
The Clef distributed architecture was purposely designed to make it virtually impossible for hackers to breach, by doing away with centralized identity data containment. So if any one part of the Clef system were to be attacked, hackers would not be able to access enough data to identify a user or their personal information.
For users, Clef does away with usernames and passwords all together, and instead replaces their login credentials with a dynamic digital signature that resides on a mobile phone. So a user’s phone now becomes their personal access key for all of their trusted digital services.
Central Point Of Failure
Over the last 18 months, some of the largest digital brands have felt the unpleasant sting of having their usernames and passwords breached. The notable brands that have been recently hacked include digital superstars like LinkedIn, Twitter, Living Social, Yahoo and others.
These companies found out the hard way that the industry standard of usernames and passwords, all held in a central server, no longer works. The same authentication and data protection model has been the de facto standard for almost the last 20 years, and it doesn’t work.
For those brands that were breached, the attacks quickly turned into a nasty public lesson. A lesson that was both embarrassing and costly.
In an attempt to better fortify their digital defenses, most of these brands responded by adding additional personal identifiers into their authentication process (two-factor logins with username, password and added signifiers) in the hopes that more complexity, would translate into greater risk mitigation.
And while to outside spectators “enhanced” authentication seems like a reasonable (all be it somewhat reactionary) strategy, consumer adoption of these technologies is almost nonexistent. Customers already hate remembering their usernames and passwords, so making logging in harder is a non-starter.
Weak Login Credentials
Even when the sites aren’t breached, passwords are weak because most users pick unsafe ones. Customers routinely create weak passwords, opting for ...