The identity protocol allows software to interface with a server, securely supplying information such as login credentials and identity information. This “crypto-identity software” could be embedded into bitcoin wallets or be a special purpose app.Overview
Passwords are a pain and are insecure. If you use the internet, you have no doubt experienced the pain. And much has been written about how human-interaction problems create insecurities -- people choose short or simple passwords, repeat passwords across time and sites, write passwords down, etc. These problems are addressed by password manager programs, but these programs have their own problems -- passwords are either backed up on the "cloud" (less secure), or cannot be easily transferred between browsers and computers.
We all know that entering your password into an untrusted computer is dangerous, and that entering your password into a trusted computer on an untrusted or insecure web site is dangerous. But homograph attacks can make this very hard to see, and typosquatting can fool the unwary.
Fundamentally, the act of entering passwords into untrusted machines or software creates a large number of vulnerabilities.
Let's fix these problems.Operation
This system is implemented in an crypto-identity app or sub-function of a Bitcoin Cash wallet, most commonly located on a phone or tablet (mobile device). The login function of the system works in 2 modes: using a passwordless public/private key login scheme, and as a traditiona...