Authentication: Who are you? Proofs are passwords, codes and keys | Dark Hacker News