I had the oddest dream last night. It involved logging into some sort of high security system. Of course, this system used two-factor authentication, but the second factor was, a dog. You entered your username and password, then you had to call this dog to you and pet him. If dog approved of you, login successful. If dog didn't come, or ignored you altogether, you were not authorized. Hmm. Maybe I should work on inventing this ...
@alpuzz lol! Hilarious! I needed that chuckle today. :)
@alpuzz Man sues restaurant after being denied entry because of his two-factor authentication dog. The man explained that for security reasons, he must keep this dog with him at all times.
Well, If everyone started employing two-factor authentication dogs, Maybe there would be far fewer service denials. Yay for unintended consequences.
@alpuzz What happens when the dog dies?
@BorrisInABox Hmm. my dream didn't get that far. That said, the way things go on the internet these days, my bet would be on the dog to outlast the online service.
@alpuzz @BorrisInABox This is an excelent idea. I can steal the dog and as well as getting the doggy cuddles I can auth into your account.
@alpuzz One of my cats would work as a good security interface. If you pet her wrong, she'll bite. So you have to know the right ... passpet. If you enter a pet-o, it will be rejected.
@marshall_0i @alpuzz three-factor authentication: something you've lost, something you've forgotten, and something that just bit you and ran away

@tslumley @marshall_0i @alpuzz Faerie Identification

edit: Troublesome Faerie Authentication

@alpuzz
This accurately describes my home security system. To enter, you must provide a password and gain the dog's approval.
@alpuzz definitely vulnerable to social engineering

@alpuzz

Jungian archetype pet friends authentication - japfa

@alpuzz 😅😅😅😅😅
@alpuzz so it was a FIDO key?
@joat @alpuzz This is such a niche joke reply but it's 1000% perfect.
@alpuzz MFA - Mutt Factor Authentication

@alpuzz

Really high security systems would use cats...

@alpuzz better to ditch the password and rely on a pair of dogs. 2 Fido Authentication.
@alpuzz and the chosen dog rotates every 60 seconds.
@alpuzz if there was some scale in the dream it would be a soft version of Anubis myth lol
@alpuzz
Make it pet interchangeable and I am in.
@alpuzz More gratifying than most two-factor authentication systems. I approve.

@alpuzz

Ah yes, the principle of leash privilege. 😂

@alpuzz Okay, but this is literally the system I use to get into my house.
@alpuzz @astronot For elevated privileges you to get the cats approval
@alpuzz sounds like a good concept for a Metal Gear game
@alpuzz this is exactly what happens when you date a girl that has a dog lol
@alpuzz for extra security, the dog is replaced by a cat...
@alpuzz time to add a few sausages to the exploit kit.
@alpuzz The two factor dog can't be a basset. They're petting promiscuous.
@alpuzz Train the dog to boop a dog-accessible-only button if it trusts the person

@alpuzz reading this post sparked a memory, so I searched the archives and, sure enough, five years ago I wrote something like this, albeit about cats

it's a dream that has legs
https://longersky.com/2018/12/15/maximum-security/

Maximum security

All other methods had failed. Strong passwords – nope. Two factor anything – nope. A robust training program regarding safe management of login credentials – no dice. Nothing worked. Except, it was…

More longer friend see that sky?
@alpuzz It's humanity's last defense against the new Terminator models https://youtu.be/U5b92SoEGO8?t=113
Future Remembered | The Terminator [Open Matte, Remastered]

YouTube
@alpuzz
Factors of authentication:
1. Something you have
2. Something you know
3. Something you are
4. Something you pet

@alpuzz IIRC, there's an old bollywood movie with that plot. Not a high security environment, but to prove identity in a court of law.

In any case, dog authentication will improve two factor authentication and eliminate cats impersonating people online.

@alpuzz I used to manage a hand reader network for perimeter access control and the manual had a great line. Something like -
Things that can accurately identify you: biometrics, a person, a dog.
@alpuzz this is weird.
I had different dream, similar to that one.
the person who needed to be authorized needed to punch one of my enemies, if this was really weak punch, this person wouldn't be authorized and would face 2 years in prison for trying to crack my system.
@alpuzz “if my dog doesn’t like you, my os won’t like you either”

I think this sort of "dog-based 2FA system" already exists. After all, take a look at how often and arbitrarily these login systems already just don't work.

@alpuzz

@alpuzz - You are having trouble with the inhuman aspects of automation . . .
https://www.jstage.jst.go.jp/article/jaabe/16/1/16_91/_pdf

M. Hulot (in n Jacques Tati's film) gets trapped in garage because dog's tail trips photo electric beam. Shouting at dog to come back causes dog to return to beam but sadly tail now between legs

@alpuzz I think that’s called Kerberos