• intensely_human
    link
    fedilink
    arrow-up
    1
    ·
    3 hours ago

    The only form of authentication that will work long term is to run a hash on the entire person.

    Basically instead of authenticating that it is the same person, you authenticate that whatever is attempting access shares enough characteristics with that person to use the resource in the same way.

    Like, a perfect transporter clone of me can get access to my stuff, but it’s okay because he’s got my same goals and moral constraints.