Next Defence

Security has an underlying defect: passwords and authentication