Business

Yahoo Password Free Log in: Issues and intent

By on

2-Yahoo-MailYahoo recently unveiled a new mechanism allowing users to log in with temporary passwords sent to their cellular phones. This new log in system, as reported in PC World, would use an on-demand password system and is based on the user?s mobile phone number.

The Features of the New Service

This service is currently available only in the United States and can be activated from the individual user?s security settings in Yahoo. In that system, a phone number is required and confirmation is done through the verification sent to the user?s phone via SMS for input into the system. Through this system, there would be a button allowing a temporary four character password to be sent to the phone via SMS.

Aside from this new system, Yahoo would be employing an end to end encryption plug in for Yahoo mail which was developed in cooperation with Google. This security feature is said to be available by the end of 2015. This was confirmed by Yahoo Chief Information Security Officer Alex Stamos in light of the new information generated from the revelations made by Edward Snowden on the NISA.

Yahoo’s Say on the New Offer

According to Yahoo?s Vice President of Product Management for Consumer Platforms Dylan Casey, this service is the first step towards the elimination of passwords. This system was designed to put Yahoo, according to Casey, ?in the shoes of the people that use their products.?

Unfortunately, this system may come a tad late as current market systems utilize a two step verification process. In this system, the traditional password is utilized alongside an additional code sent via linked mobile device to increase the account?s security. The traditional password may be hackable but put together with the additional mobile code sent, then the account may prove to be very very difficult to crack.

Users Beware

The only loophole in this seemingly impregnable seen is if the individual loses their mobile phone. For security experts, this may seem to be a lax manner of generating security measures, as the mobile device may become lost or stolen. Many view that this is a publicity gimmick, designed to generate more public participation and sales instead of being more careful with handling data.

 

About the author

To Top