Security theory: There are 3 ways to authenticate yourself. Most of the time you may prefer anonymity, but in some cases, you must
prove you are who you say you are. If you are trying to access my house, my safe deposit box, my hard drive, etc, you must authenticate to the satisfaction of the door knob, the bank, or the filesystem respectively.
These are the 3 methods of Authentication:
What you have -- keys, badges, ID, passcards, tokens.
These are physical objects and go towards identifying you by what you physically *own*. The obvious problem here is that objects can be taken and are not tied or "signed" to any particular person. This makes it easy to loan your verification for temporary uses like valet parking, but objects can be stolen. Keys can be duplicated, IDs can be faked, and nobody knows what the heck a valid badge looks like anyway.
How many FBI badges or CIA ID cards have you seen? How would you know if it's real?
What you are, your DNA, fingerprints, voice match, cadence of your typing, your walk, talk, act. Your smell, shoeprints, aura, your retinal scan, your vein patterns. Anything that leaves the impression of YOU, but nothing that can come from someone else. These are things that can be taken from you. They cannot be faked but can be stolen. Secondary level of security, What you are is better than what you have, but is nothing compared to what you know.
What you know. Passwords, passphrases. Things that
cannot be beaten out of you. Passwords cannot be compelled to be told, they cannot be stolen (from your mind), they cannot be duplicated. Other examples include your memories.
We've all thought about the time traveler trick. Imagine yourself from the future convincing yourself now that you are really the future you. You can name things that
only you could possibly know, such as your 2nd pet's name, the number of girls you've slept with, etc.
Needless to say, this method of authentication is the most secure and the most unwieldly.
In previous posts I discussed the UK woman who is being forced to reveal her decryption key. Could this happen to you?
Her door keys can be duplicated, her fingerprints can be stolen or coerced, but no court could make her, me, or you spell out your most secret passwords. What you know is better than what you have or what you are.