This project examines the concept of concealing the authentication interface on websites.
The terms Security through Obscurity or
Steganoauthentication could potentially be considered for this purpose;
however, both terms already have established meanings that differ from our concept.
Our focus, however, is on Steganeisodos (from the Greek Steganós, meaning "hidden," and Eísodos, meaning "access" or "entry"),
which we will also refer to as Authentication Interface Concealment (AIC).
Steganeisodos synonymous with Authentication Interface Concealment (AIC),
is a security design methodology that utilizes a hidden, undocumented mechanism as its core. This mechanism is accessed via an entry point that can either be a publicly visible interface – whose apparent function is standard authentication – or a completely non-obvious interaction point. Access is granted upon activation by a specific, predefined trigger condition (such as entering a secret password or performing a sequence of actions), unlocking a concealed area or functionality of the system.
Reviewing the Collected Data
📊︎
You can view the statistical data by following this link.
This step is only available once the statistical data has been collected.
Verification
⚿
Here comes the exciting part! It's time to see if the system can recognize your typing.
Ready to start? Click here to begin.
This step is also only available once the statistical data has been collected.
Reset Data
↺
Should you wish to begin the process again, please select
this link.
Be advised that this action will permanently delete all data you have previously entered.