Steganeisodos, i.e Authentication Interface Concealment (AIC)

Introduction

This project examines the concept of concealing the authentication interface on websites. The terms Security through Obscurity or Steganoauthentication could potentially be considered for this purpose; however, both terms already have established meanings that differ from our concept. Our focus, however, is on Steganeisodos (from the Greek Steganós, meaning "hidden," and Eísodos, meaning "access" or "entry"), which we will also refer to as Authentication Interface Concealment (AIC).

Steganeisodos synonymous with Authentication Interface Concealment (AIC), is a security design methodology that utilizes a hidden, undocumented mechanism as its core. This mechanism is accessed via an entry point that can either be a publicly visible interface – whose apparent function is standard authentication – or a completely non-obvious interaction point. Access is granted upon activation by a specific, predefined trigger condition (such as entering a secret password or performing a sequence of actions), unlocking a concealed area or functionality of the system.

NTR strategy

Collecting experimental data

At this stage, you need to choose a password and enter it at least 10 times in a row at your natural typing rhythm (NTR).
Ready? Click to Start!

Reviewing the Collected Data

📊︎ You can view the statistical data by following this link.
This step is only available once the statistical data has been collected.

Verification

Here comes the exciting part! It's time to see if the system can recognize your typing. Ready to start? Click here to begin.
This step is also only available once the statistical data has been collected.

Reset Data

Should you wish to begin the process again, please select this link.
Be advised that this action will permanently delete all data you have previously entered.