The digital world is no longer about cops and robbers but large-scale cybersecurity issues that the Token Ring, a $250 smart ring, addresses at the endpoint level. Unless you live off-the-grid and can do away without passwords and keys, the constant fear of identity theft can be overwhelming. And with everything going digital, keeping secure and authenticated (and not forgetting credentials) is a daily struggle that we wish simplified. How big is this problem globally? The Nilson Report in October 2016 reported the logarithmic rise of annual credit card fraud from 3B in 2000 to over 24B in 2016.
For anyone who has been hacked, it becomes an obsession to manage the risk and ensure that every connection is not just convenient but safe. But choosing which gadget to use among the many in the market is a difficult task. One of the things to consider is whether the developers can keep in step with the pace of IoT, AR, and AI growth. With the Token Ring, you have the confidence that it is not an innovation that’s bound to be just a passing trend like Snap Glasses.
There was a time when smart wearables were bulky, superfluous, and was more of a problem than a solution – everything that this smart jewelry isn’t. The Token Ring has two-factor authentication and is equipped with a fingerprint sensor, Bluetooth, and NFC (near-field communication) for a contactless operation that does not require Wi-Fi, 3G or LTE. The Token Ring is fully capable of replacing your wallet (MasterCard or Visa), car keys, house keys, access cards and transit cards as well as managing your myriad passwords for your computer (PC or Mac) and other gadgets.
Its minimalist style, functionality, durability, and stylish colors like rose gold, brushed sterling, and rhodium makes it a good-looking, indispensable, discreet assistant that can open doors, gain you office access, pay with MasterCard or Visa, turn-on your computer, and more by scanning, tapping and knocking. Made of Argentinium Sterling Silver, it is more tarnish-resistant than regular silver finishes and has resin protecting the components in the inner rim.
It pulses rainbow lights when it recognizes the user and flashes a blinking red LED light when it doesn’t. According to Steve Dunkel, the fingerprint data used to authenticate the ring is “stored on the secure element within your Token. It never leaves the ring, so you can be sure that it’s safe.” Aside from this chip, it also has an optical sensor that detects when the Token is taken off your finger and “automatically locks the credentials” so it can’t be used by others.
No worries about it getting lost or stolen as it’s uncrackable once removed because it takes biometrics and the ring for it to work – otherwise, it stays locked. Once authenticated, there is no need for a smartphone to process contactless transactions. It is waterproof to a depth of 50 meters, comes with a USB charger and can last 14 days on a single charge. And to personalize the experience, it comes in just your size and authenticated only to a single user. You can even engrave the outer layer to a depth of .6 mm without damaging the core. For now, it only ships in the U.S. but can be used internationally and can load multiple credit cards.
Token works by sending NFC payments from the secure element to the payment terminal. It all works very similarly to Android or Apple Pay. – Steve Dunkel
The company is headed by Steve and Melanie Shapiro (see photos), creators of Digsby, a platform for managing social identities. Combining their Bloomberg and Microsoft expertise with the track record and technical skills of Richard Lourette and Stephen Schultz in biometry, imaging, cryptography, software, hardware, and satellite technology makes the company a heavyweight in embedded wearable devices. Currently, they are working with the biggest names like Microsoft, Visa, MasterCard, and supported by investors among them Bloomberg and Future Perfect Ventures.
“One ring to access everything … Token is your password, house key, credit card, car key, access badge and transit card.” Steve Shapiro
Passwords are such a complex matter to discuss. A lot of individuals believe that out of the millions of individuals using the Web they couldn’t be targeted by hackers. Whether you believe it or not, it can happen to you.
A study by an individual from the University of Cambridge revealed that individuals over 55 are the ones that create the best passwords.
Joseph Bonneau was given access by Yahoo in their passwords archive. Of course, he was subjected to a thing called hashing were he can’t use your account.
Password strengths are measured by the probability of someone being able to guess your password. He discovered that the average password will take an individual 1,000 attempts before he can guess it correctly.
What is strange is that individuals over 55 create passwords that are difficult to guess, compared to tech-savvy teens and yuppies who frequently access the Web.
The study showed that 0.14 individuals have the same passwords. Bonneau says that this might be because of numerical configurations.
Bonneau also found out that Germans and Koreans create strong passwords. Indonesians, Italians and Vietnamese on the other hand, lag behind in this study.
Remember, to create strong passwords to protect your accounts.
We often take power adapters for granted. We see them as something that we have to plug in the socket in order for electricity to flow to our devices. After that, we see them as nothing more than a piece that we can discard.
But this modest piece may soon turn into something more than we see it. This seemingly unimportant contraption can now turn into a tool that can help you with anti-theft measures.
Apple has just filed for a patent that requires for people to plug in their adapters to help them remember their passwords.
In patent number 2012/0005747, Apple will develop an adapter whose transformer unit has a memory module built inside it. Only the correct device will have the ability to recover data.
New Scientist says that Apple was quoted as saying, “if the password is not easily and conveniently recoverable, the consumer is likely to choose either not to use a password at all or to use a trivial password. Both choices increase the threat of data loss.”
The memory module that is in the transformer unit stores the encrypted password.
With this, it will make it harder for identity thieves to steal some of your stored data or from someone from recovering your password.