{"version":"1.0","provider_name":"UNI FR","provider_url":"https:\/\/www.uni.lu\/fr","author_name":"UNI FR","author_url":"https:\/\/www.uni.lu\/fr","title":"SRM Research Seminar: Passwords are Dead - What's Next?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"At40Zej6FR\"><a href=\"https:\/\/www.uni.lu\/fr\/events\/srm-research-seminar-passwords-are-dead-whats-next\/\">SRM Research Seminar: Passwords are Dead &#8211; What&rsquo;s Next?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.uni.lu\/fr\/events\/srm-research-seminar-passwords-are-dead-whats-next\/embed\/#?secret=At40Zej6FR\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0SRM Research Seminar: Passwords are Dead &#8211; What&rsquo;s Next?\u00a0\u00bb &#8212; UNI FR\" data-secret=\"At40Zej6FR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","thumbnail_width":2560,"thumbnail_height":2560,"description":"There is growing discomfort about password-based authentication, and passwords are declared \"dead\" on a regular basis. However, passwords are still the most widely used tool for user authentication on the Internet. In this talk we will have a closer look on the current state of user authentication, and will discuss several variants to strengthen user authentication. One specifically interesting approach is to use additional signals such as source IP, geo-location, or browser configuration. These allow a service to estimate the risk of a malicious login and to take appropriate countermeasures. This requires minimal changes to the user experience, and is used in practice by several services."}