Montreal, QC H3H-1P2
SupportNeed help? Contact us!
FAQFrequently asked questions
Really. Zeropasswords does not maintain a database of usernames and passwords, because it does not compare user input against stored samples. As a matter of fact, Zeropasswords login webpages do not expect any input from the user. Users interact only with their mobile devices, which also do not store any passwords.
Every time a registered user attempts to access his profile at a website, Zeropasswords notifies the user’s mobile device and asks her/him to interact with their mobile and perform a gesture to make an event happen. If s/he does and the event happens, s/he is logged in. Otherwise, the login request is refused. This novel and patented don’t-call-us-we’ll-call-you user authentication process totally eradicates imposters.
Gestures are not stored in their mobiles or anywhere else because Zeropasswords does not verify them against stored samples. Instead, Zeropasswords passes them on as parameters to mathematical formulas and algorithms, and then discards them.
A gesture in Zerpasswords is a secret that only the user knows and performs on his mobile device. Websites are not involved. A password is a shared secret that both the user and the website know, and frankly the website does not need the user. This is why hackers attack websites exclusively and not users, because they find everything they need at the website in order to access and obtain user valuables.
Absolute! Today, the industry standard is to use data to protect other data. We use security data such as passwords, PINs, fingerprints, etc. to protect valuable data such as money, intellectual properties, documents, movies, songs, identities, etc. All hacking techniques today without exception are data grabbing techniques. Hackers break in to either make a copy of security data or make a copy of valuable data, and they succeed because both are usually stored unecrypted. Zeropasswords introduces two disruptions to data grabbing techniques. First, there is no security data stored anywhere for hackers to steal or copy. And second, any valuable data is stored in encrypted form, which is of no value to hackers.