![]() | This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||
|
This article needs considerable expansion. Could someone with expertise have a go at it? Dbfirs 14:24, 20 February 2009 (UTC)
Without third-party sources, unlike the ones in there now, to say nothing of a clear definition, this really doesn't merit an article. I think the concept is already covered quickly and cleanly in Authentication. ★NealMcB★ ( talk) 04:15, 14 May 2011 (UTC)
This article has several issues:
The subject is relevant as increasing Internet fraud makes this stronger approach of authentication more relevant. The main article about authentication is not really able to answer this and really responds in a summary approach (which is good enough in the overall context of authentication).
I am currently selecting notable sources to improve this article. If anybody wants to join in, pls simply comment in this talk page. Also you might want to provide links to sources here. Any support or suggestions are deeply appreciated.
ScienceGuard ( talk) 08:41, 1 June 2016 (UTC)
Everest.org is building and deploying a strong encryption solution. It is promising because it is based on facial recognition, something you have, and will therefore exclude bots and imposters. It will be helpful to mention this and other similar efforts underway. thanks! Lbeaumont ( talk) 13:28, 7 October 2023 (UTC)
It is disappointing that social media sites are slow to integrate strong authentication into their platforms. Being able to identify the (human) author of each social media post is an important step toward improving the intellectual honesty of each post. Perhaps some discussion of the current state of strong authentication on social media sites, along with a discussion of forces advancing and delaying the uptake will be helpful. Thanks! Lbeaumont ( talk) 13:32, 7 October 2023 (UTC)
![]() | This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||
|
This article needs considerable expansion. Could someone with expertise have a go at it? Dbfirs 14:24, 20 February 2009 (UTC)
Without third-party sources, unlike the ones in there now, to say nothing of a clear definition, this really doesn't merit an article. I think the concept is already covered quickly and cleanly in Authentication. ★NealMcB★ ( talk) 04:15, 14 May 2011 (UTC)
This article has several issues:
The subject is relevant as increasing Internet fraud makes this stronger approach of authentication more relevant. The main article about authentication is not really able to answer this and really responds in a summary approach (which is good enough in the overall context of authentication).
I am currently selecting notable sources to improve this article. If anybody wants to join in, pls simply comment in this talk page. Also you might want to provide links to sources here. Any support or suggestions are deeply appreciated.
ScienceGuard ( talk) 08:41, 1 June 2016 (UTC)
Everest.org is building and deploying a strong encryption solution. It is promising because it is based on facial recognition, something you have, and will therefore exclude bots and imposters. It will be helpful to mention this and other similar efforts underway. thanks! Lbeaumont ( talk) 13:28, 7 October 2023 (UTC)
It is disappointing that social media sites are slow to integrate strong authentication into their platforms. Being able to identify the (human) author of each social media post is an important step toward improving the intellectual honesty of each post. Perhaps some discussion of the current state of strong authentication on social media sites, along with a discussion of forces advancing and delaying the uptake will be helpful. Thanks! Lbeaumont ( talk) 13:32, 7 October 2023 (UTC)