Applying the “Six Questions” to LinkedIn Self-promotion

(UPDATE OCTOBER 23, 2023: “SIX QUESTIONS YOUR CONTENT CREATOR SHOULD ASK YOU IS SO 2022. DOWNLOAD THE NEWER “SEVEN QUESTIONS YOUR CONTENT CREATOR SHOULD ASK YOU” HERE.)

I’ve previously talked about the six questions your content creator should ask you. And I eat my own wildebeest food. I used the six questions to create a self-promotion blog post and LinkedIn post.

But since you care about YOUR self-promotion rather than mine, I’ll provide three tips for writing and promoting your own LinkedIn post.

How I promoted my content

Before I wrote the blog post or the LinkedIn post, I used my six questions to guide me. For my specific example, here are the questions and the answers.

QuestionPrimary AnswerSecondary Answer (if applicable)
Why?I want full-time employmentI want consulting work
How?State identity and marketing qualifications, ask employers to hire meState identity and marketing qualifications, ask consulting clients to contract with me
What?Blog post (jebredcal), promoted by a personal LinkedIn postBlog post (jebredcal), promoted by a Bredemarket Identity Firm Services LinkedIn post
Goal?Employers contact me for full-time employmentConsulting prospects contact me for contract work
Benefits?(1) No identity learning curve
(2) No content learning curve
(3) Proven results
(same)
Target Audience?Identity companies hiring Senior Product Marketing Managers and Senior Content Marketing ManagersIdentity companies contracting with content marketing consultants
For more information on the six questions, see https://bredemarket.com/2022/12/18/six-questions-your-content-creator-should-ask-you-the-e-book-version/.

You’ll notice that I immediately broke a cardinal rule by having both a primary goal and a secondary goal. When you perform your own self-promotion, you will probably want to make things less messy by having only a single goal.

So based upon these responses, I created…

First, the blog post

The Bredemarket blog is primarily to promote my consulting work. I have a different blog (jebredcal) to promote my full-time employment (or attempts to secure full-time employment).

Because the primary goal was to secure full-time employment, I posted to jebredcal instead of Bredemarket.

After the introduction (pictured above) with its “If you need a full-time employee” call to action, I then shared three identity-related blog posts from the Bredemarket blog to establish my “biometric content marketing expert” (and “identity content marketing expert”) credentials. I then closed with a dual call to action for employers and potential consulting clients. (I told you it is messy to have two goals.)

If you want to see my jebredcal post “Top 3 Bredemarket Identity Posts in June 2023 (so far),” click here.

So how did I get the word out about this personal blog post? I chose LinkedIn. (In my case, hiring managers probably aren’t going to check my two Instagram accounts.)

Second, the LinkedIn post

I often reshare my Bredemarket blog posts on various Bredemarket social media accounts. In this instance I only reshared it on LinkedIn, since that’s where the hiring managers are. While I shared the blog post to my Bredemarket Identity Firm Services LinkedIn page (since the post talked about identity), my primary goal was to share it to my personal LinkedIn feed.

It was simple to write the LinkedIn text, since I repurposed the introduction of the blog post itself. I added four hashtags, and then the post went live. You can see it here.

And by the way, feel free to like the LinkedIn post, comment on it, or even reshare it. I’ll explain why below.

Third, the “LinkedIn Love” promotion

So how did I promote it? Via the “LinkedIn Love” concept. (Some of you know where I learned about LinkedIn Love.)

To get LinkedIn love, I asked a few trusted friends in the identity industry to like, comment, or reshare the post. This places the post on my friends’ feeds, where their identity contacts will see it.

A few comments:

  • I don’t do this for every post, or else I will have no friends. In fact, this is the first time that I’ve employed “LinkedIn Love” in months.
  • I only asked friends in the identity industry, since these friends have followers who are most likely to hire a Senior Product Marketing Manager or Senior Content Marketing Manager.
  • I only asked a few friends in the identity industry, although eventually some friends that I didn’t ask ended up engaging with the post anyway.

I have wonderful friends. After several of them gave “LinkedIn Love,” The post received significant engagement. As of Friday morning, the post had acquired over 1,700 impresions. That’s many, many more than my posts usually acquire.

I don’t know if this activity will directly result in full-time employment or increased consulting work. But it certainly won’t hurt.

Three steps to promote YOUR content

But the point of this post isn’t MY job search. It’s YOURS (or whatever it is you want to promote).

For example, one of my friends who is also seeking full-time employment wanted to know how to use a LinkedIn post to promote THEIR OWN job search.

Now you don’t need to use my six questions. You don’t need to create a blog post before creating the LinkedIn post. And you certainly don’t need to create two goals. (Please don’t…unless you want to.)

In fact, you can create and promote your own LinkedIn post in just THREE steps.

Step One: What do you want to say?

My six questions obviously aren’t the only method to collect your thoughts. There are many, many other tools that achieve the same purpose. The important thing is to figure out what you want to say.

  • Start at the end. What action do you want the reader to take after reading your LinkedIn post? Do you want them to read your LinkedIn profile, or download your resume, or watch your video, or join your mailing list, or email or call you? Whatever it is, make sure your LinkedIn post includes the appropriate “call to action.”
  • Work on the rest. Now that you know how your post will end, you can work on the rest of the post. Persuade your reader to follow your call to action. Explain how you will benefit them. Address the post to the reader, your customer (for example, a potential employer), and adopt a customer focus.

Step Two: Say it.

If you don’t want to write the post yourself, then ask a consultant, a friend, or even a generative AI tool to write something for you. (Just because I’m a “get off my lawn” guy regarding generative AI doesn’t mean that you have to be.)

(And before you ask, there are better consultants than Bredemarket for THIS writing job. My services are designed and priced for businesses, not individuals.)

After your post is written by you or someone (or something) else, have one of your trusted friends review it and see if the written words truly reflect how amazing and outstanding you are.

Once you’re ready, post it to LinkedIn. Don’t delay, even if it isn’t perfect. (Heaven knows this blog post isn’t perfect, but I posted it anyway.) Remember that if you don’t post your promotional LinkedIn post, you are guaranteed to get a 0% response to it.

Step Three: Promote it.

Your trusted friends will come in handy for the promotion part—if they have LinkedIn accounts. Privately ask your trusted friends to apply “LinkedIn Love” to your post in the same way that my trusted friends did it for me.

By the way—if I know you, and you’d like me to promote your LinkedIn post, contact me via LinkedIn (or one of the avenues on the Bredemarket contact page) and I’ll do what I can.

And even if I DON’T know you, I can promote it anyway.

I’ve never met Mary Smith in my life, but she says that she read my Bredemarket blog post “Applying the “Six Questions” to LinkedIn Self-promotion.” Because she selects such high-quality reading material, I’m resharing Mary’s post about how she wants to be the first human to visit Venus. If you can help her realize her dream, scroll to the bottom of her post and donate to her GoFundMe.

Hey, whatever it takes to get the word out.

Let me know if you use my tips…or if you have better ways to achieve the same purpose.

How Does Ontario International Airport Affect Inland Empire Businesses?

As some of you know, I’m applying for full-time employment. Every one of my cover letters has a variation on this sentence.

I am in Southern California, five miles from Ontario International Airport, and can easily travel throughout the United States or to other countries as needed.

By Vmzp85 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=64427385

You will note that I explicitly state that Ontario International Airport is in Southern California, not Canada. Although the phrase “Ontario CA” can be interpreted as referring to the city in the state of California, or the province in the country of Canada, depending upon how you look at it.

Not that anybody pays attention to my explicit California reference. When I was sharing pictures from the February 18 Ontario Art Walk, and labeling the pictures as originating from Ontario, California, I was still asked to promote one of the pictures on a Canadian Instagram page.

The curse that we endure in the town of the Chaffeys. I bet Mildura doesn’t have this problem.

While Ontario International Airport is not the only airport in the Inland Empire, it is (at present) the largest one, and thus has a dramatic effect on those of us who live here.

But what is that effect?

Good times

There is certainly a positive financial effect. Oxford Economics prepared a white paper entitled “The Economic Impact of Ontario International Airport, September 2022.”

One impact? Well, in the same way that I can board a flight from ONT to my future employer in San Francisco or Austin or Paris or wherever, visitors can board flights to ONT.

And some of those visitors are business visitors. Years ago, I was one of them, flying from Portland, Oregon to some town I had never heard of before for a job interview. Not only did I fly into the airport (Terminal 1 in those days), but I also stayed at the Red Lion Inn and spent other money while I was in town for the interview.

Ontario International Airport Terminal 1 as of September 2021, 20 years after airport traffic changed forever.

Postscript: I got the job. And other jobs after that.

The economists assign a monetary impact to the activity attributable to the airport.

The impact of economic activity taking place at Ontario International
Airport itself, including the activity of the airport authority, airlines
and their suppliers, government workers, airport concessions, and
logistics companies is estimated at $3.8 billion in 2022. This will
support $2.2 billion in GDP and 27,800 jobs. The bulk of these
impacts—71% of the GDP impacts and 76% of the jobs impacts—
reflect the impact of visitor spending in the region.

From https://www.flyontario.com/sites/default/files/2022-11/ONT-Economic-Report-2022.pdf

But don’t forget the government, which gets its own goodies.

This $2.2 billion of local economic activity (GDP) will result in a total
of $571 million in tax impact. This consists of $319 million in federal
tax impacts and $253 million in state and local impacts. As with the
GDP impacts, the majority (71%) of these tax impacts are driven by
the spending of visitors to the region.

From https://www.flyontario.com/sites/default/files/2022-11/ONT-Economic-Report-2022.pdf

And this doesn’t count the impact of the Inland Empire’s logistics industry.

The total economic impact of the logistics activity in the eight zip codes adjacent to Ontario International Airport was $17.8 billion of economic output, $9.9 billion of GDP, and 122,200 jobs. This activity generated $2.3 billion in federal, state, and local taxes.

From https://www.flyontario.com/sites/default/files/2022-11/ONT-Economic-Report-2022.pdf

Bad times

But what of non-monetary impacts? As the description of the Ontario International Airport – Inter Agency Collaborative (ONT-IAC) makes clear, some of those impacts are negative.

The ONT-IAC implements the policies and criteria of the Airport Land Use Compatibility Plan (ALUCP) to prevent future incompatible land uses surrounding ONT and minimizing the public’s exposure to excessivie noise and safety hazards. 

From https://www.ontarioca.gov/planning/ont-iac

There’s always a balancing act between positive and negative impacts. While I might appreciate the ability to board a flight to Dallas at 6:00 in the morning, someone who lives near the airport may not be as appreciative. And the referenced “incompatible land uses” restrict the types of businesses that can be located near the airport.

While the Amazon LGB3 warehouse in Eastvale, California is some distance from Ontario International Airport, the airport’s presence has a positive impact on the warehouse and its workers.

But the relatively large amount of open space near the airport (again, our beloved warehouses) has helped to ensure that ONT does not need to implement the severe flight restrictions found at John Wayne and our former airport overlord Los Angeles International Airport.

And for better or worse the airport will remain for some time. It’s not like it’s going to close down or anything.

Although 9/11, the 2008 recession, and COVID tried to close it.

And one more thing about your business…

Does your firm need to create content for Inland Empire residents, Inland Empire visitors, and others who use your firm’s services?

Are you ready to take your Ontario, Eastvale, or Inland Empire firm to the next level with a compelling message that increases awareness, consideration, conversion, and long-term revenue?

Let’s talk today!

We Survived Gummy Fingers. We’re Surviving Facial Recognition Inaccuracy. We’ll Survive Voice Spoofing.

(Part of the biometric product marketing expert series)

Some of you are probably going to get into an automobile today.

Are you insane?

The National Highway Traffic Safety Administration has released its latest projections for traffic fatalities in 2022, estimating that 42,795 people died in motor vehicle traffic crashes.

From https://www.nhtsa.gov/press-releases/traffic-crash-death-estimates-2022

When you have tens of thousands of people dying, then the only conscionable response is to ban automobiles altogether. Any other action or inaction is completely irresponsible.

After all, you can ask the experts who want us to ban biometrics because it can be spoofed and is racist, so therefore we shouldn’t use biometrics at all.

I disagree with the calls to ban biometrics, and I’ll go through three “biometrics are bad” examples and say why banning biometrics is NOT justified.

  • Even some identity professionals may not know about the old “gummy fingers” story from 20+ years ago.
  • And yes, I know that I’ve talked about Gender Shades ad nauseum, but it bears repeating again.
  • And voice deepfakes are always a good topic to discuss in our AI-obsessed world.

Example 1: Gummy fingers

My recent post “Why Apple Vision Pro Is a Technological Biometric Advance, but Not a Revolutionary Biometric Event” included the following sentence:

But the iris security was breached by a “dummy eye” just a month later, in the same way that gummy fingers and face masks have defeated other biometric technologies.

From https://bredemarket.com/2023/06/12/vision-pro-not-revolutionary-biometrics-event/

A biometrics industry colleague noticed the rhyming words “dummy” and “gummy” and wondered if the latter was a typo. It turns out it wasn’t.

To my knowledge, these gummy fingers do NOT have ridges. From https://www.candynation.com/gummy-fingers

Back in 2002, researcher Tsutomu Matsumoto used “gummy bears” gelatin to create a fake finger that fooled a fingerprint reader.

Back in 2002, this news WAS really “scary,” since it suggested that you could access a fingerprint reader-protected site with something that wasn’t a finger. Gelatin. A piece of metal. A photograph.

Except that the fingerprint reader world didn’t stand still after 2002, and the industry developed ways to detect spoofed fingers. Here’s a recent example of presentation attack detection (liveness detection) from TECH5:

TECH5 participated in the 2023 LivDet Non-contact Fingerprint competition to evaluate its latest NN-based fingerprint liveness detection algorithm and has achieved first and second ranks in the “Systems” category for both single- and four-fingerprint liveness detection algorithms respectively. Both submissions achieved the lowest error rates on bonafide (live) fingerprints. TECH5 achieved 100% accuracy in detecting complex spoof types such as Ecoflex, Playdoh, wood glue, and latex with its groundbreaking Neural Network model that is only 1.5MB in size, setting a new industry benchmark for both accuracy and efficiency.

From https://tech5.ai/tech5s-mobile-fingerprint-liveness-detection-technology-ranked-the-most-accurate-in-the-market/

TECH5 excelled in detecting fake fingers for “non-contact” reading where the fingers don’t even touch a surface such as an optical surface. That’s appreciably harder than detecting fake fingers that touch contact devices.

I should note that LivDet is an independent assessment. As I’ve said before, independent technology assessments provide some guidance on the accuracy and performance of technologies.

So gummy fingers and future threats can be addressed as they arrive.

But at least gummy fingers aren’t racist.

Example 2: Gender shades

In 2017-2018, the Algorithmic Justice League set out to answer this question:

How well do IBM, Microsoft, and Face++ AI services guess the gender of a face?

From http://gendershades.org/. Yes, that’s “http,” not “https.” But I digress.

Let’s stop right there for a moment and address two items before we continue. Trust me; it’s important.

  1. This study evaluated only three algorithms: one from IBM, one from Microsoft, and one from Face++. It did not evaluate the hundreds of other facial recognition algorithms that existed in 2018 when the study was released.
  2. The study focused on gender classification and race classification. Back in those primitive innocent days of 2018, the world assumed that you could look at a person and tell whether the person was male or female, or tell the race of a person. (The phrase “self-identity” had not yet become popular, despite the Rachel Dolezal episode which happened before the Gender Shades study). Most importantly, the study did not address identification of individuals at all.

However, the findings did find something:

While the companies appear to have relatively high accuracy overall, there are notable differences in the error rates between different groups. Let’s explore.

All companies perform better on males than females with an 8.1% – 20.6% difference in error rates.

All companies perform better on lighter subjects as a whole than on darker subjects as a whole with an 11.8% – 19.2% difference in error rates.

When we analyze the results by intersectional subgroups – darker males, darker females, lighter males, lighter females – we see that all companies perform worst on darker females.

From http://gendershades.org/overview.html

What does this mean? It means that if you are using one of these three algorithms solely for the purpose of determining a person’s gender and race, some results are more accurate than others.

Three algorithms do not predict hundreds of algorithms, and classification is not identification. If you’re interested in more information on the differences between classification and identification, see Bredemarket’s November 2021 submission to the Department of Homeland Security. (Excerpt here.)

And all the stories about people such as Robert Williams being wrongfully arrested based upon faulty facial recognition results have nothing to do with Gender Shades. I’ll address this briefly (for once):

  • In the United States, facial recognition identification results should only be used by the police as an investigative lead, and no one should be arrested solely on the basis of facial recognition. (The city of Detroit stated that Williams’ arrest resulted from “sloppy” detective work.)
  • If you are using facial recognition for criminal investigations, your people had better have forensic face training. (Then they would know, as Detroit investigators apparently didn’t know, that the quality of surveillance footage is important.)
  • If you’re going to ban computerized facial recognition (even when only used as an investigative lead, and even when only used by properly trained individuals), consider the alternative of human witness identification. Or witness misidentification. Roeling Adams, Reggie Cole, Jason Kindle, Adam Riojas, Timothy Atkins, Uriah Courtney, Jason Rivera, Vondell Lewis, Guy Miles, Luis Vargas, and Rafael Madrigal can tell you how inaccurate (and racist) human facial recognition can be. See my LinkedIn article “Don’t ban facial recognition.”

Obviously, facial recognition has been the subject of independent assessments, including continuous bias testing by the National Institute of Standards and Technology as part of its Face Recognition Vendor Test (FRVT), specifically within the 1:1 verification testing. And NIST has measured the identification bias of hundreds of algorithms, not just three.

In fact, people that were calling for facial recognition to be banned just a few years ago are now questioning the wisdom of those decisions.

But those days were quaint. Men were men, women were women, and artificial intelligence was science fiction.

The latter has certainly changed.

Example 3: Voice spoofs

Perhaps it’s an exaggeration to say that recent artificial intelligence advances will change the world. Perhaps it isn’t. Personally I’ve been concentrating on whether AI writing can adopt the correct tone of voice, but what if we take the words “tone of voice” literally? Let’s listen to President Richard Nixon:

From https://www.youtube.com/watch?v=2rkQn-43ixs

Richard Nixon never spoke those words in public, although it’s possible that he may have rehearsed William Safire’s speech, composed in case Apollo 11 had not resulted in one giant leap for mankind. As noted in the video, Nixon’s voice and appearance were spoofed using artificial intelligence to create a “deepfake.”

It’s one thing to alter the historical record. It’s another thing altogether when a fraudster spoofs YOUR voice and takes money out of YOUR bank account. By definition, you will take that personally.

In early 2020, a branch manager of a Japanese company in Hong Kong received a call from a man whose voice he recognized—the director of his parent business. The director had good news: the company was about to make an acquisition, so he needed to authorize some transfers to the tune of $35 million. A lawyer named Martin Zelner had been hired to coordinate the procedures and the branch manager could see in his inbox emails from the director and Zelner, confirming what money needed to move where. The manager, believing everything appeared legitimate, began making the transfers.

What he didn’t know was that he’d been duped as part of an elaborate swindle, one in which fraudsters had used “deep voice” technology to clone the director’s speech…

From https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=8e8417775591

Now I’ll grant that this is an example of human voice verification, which can be as inaccurate as the previously referenced human witness misidentification. But are computerized systems any better, and can they detect spoofed voices?

Well, in the same way that fingerprint readers worked to overcome gummy bears, voice readers are working to overcome deepfake voices. Here’s what one company, ID R&D, is doing to combat voice spoofing:

IDVoice Verified combines ID R&D’s core voice verification biometric engine, IDVoice, with our passive voice liveness detection, IDLive Voice, to create a high-performance solution for strong authentication, fraud prevention, and anti-spoofing verification.

Anti-spoofing verification technology is a critical component in voice biometric authentication for fraud prevention services. Before determining a match, IDVoice Verified ensures that the voice presented is not a recording.

From https://www.idrnd.ai/idvoice-verified-voice-biometrics-and-anti-spoofing/

This is only the beginning of the war against voice spoofing. Other companies will pioneer new advances that will tell the real voices from the fake ones.

As for independent testing:

A final thought

Yes, fraudsters can use advanced tools to do bad things.

But the people who battle fraudsters can also use advanced tools to defeat the fraudsters.

Take care of yourself, and each other.

Jerry Springer. By Justin Hoch, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=16673259

From EUDCC to GDHCN: The Evolution of Vaccine Certificates

Back in 2021, it seemed that I was commenting on the EU Digital COVID Certificate (EUDCC) ad nauseum. The EUDCC is the “vaccine passport” that was developed to allow people in member EU countries to prove their COVID vaccination status in another EU country.

From the EC site.

My most recent post on the EUDCC was written on August 30, 2021, and discussed the International Air Transport Association (IATA) endorsement of the EUDCC as a global standard. But did it matter? I took a look at how global standards are adopted (hint: brute force):

If a lot of people like something, it’s a standard.

If a trillion dollar company likes something, and I like something different, then the thing that the trillion dollar company likes is a standard.

If two trillion dollar companies like two different things…it can get messy.

From https://bredemarket.com/2021/08/30/iata-endorses-the-eudcc-but-will-it-matter/

August 2021 was the last time that I wrote about the EUDCC in the Bredemarket blog. Until now.

Enter…WHO?

You know how standards are adopted by brute force from big players? Well, one big player has forced itself into the discussion. That player is the World Health Organization, commonly known as WHO.

It seems to me they give these vaccine certificates now-a-days very peculiar names. By Public Domain – Snapshot Image – https://archive.org/details/ClassicComedyTeams, Public Domain, https://commons.wikimedia.org/w/index.php?curid=25914575

But according to Masha Borak at Biometric Update, the WHO is just recognizing that the “EU” Digital COVID Certificate has expanded far beyond the EU.

Stella Kyriakides, the European commissioner for health and food safety (announced) that the voluntary certificate program has already been taken up by almost 80 countries.

From https://www.biometricupdate.com/202306/united-nations-taking-over-eu-covid-certificate-program-july-1

Last I checked there were not 80 countries in the EU. So this health standards thing took off after the initial hiccups. Although the Wikipedia list of non-EU adopting countries does not include two big players—the United States and China (the same two countries I cited in my August 2021 post).

Therefore, it made sense for WHO to get in on the act with its Global Digital Health Certification Network, allowing worldwide responses to post-COVID issues.

WHO’s Global Digital Health Certification Network is an open-source platform, built on robust & transparent standards that establishes the first building block of digital public health infrastructure for developing a wide range of digital products for strengthening pandemic preparedness and to deliver better health for all….

The GDHCN is builds (sic) upon the experience of regional networks for COVID-19 Certificates and takes up the infrastructure and experiences with the digital European Union Digital COVID Certificate (EU DCC) system, which has seen adoption across all Member States of the EU as well as 51 non-EU countries and territories. The GDHCN has been designed to be interoperable with other existing regional networks (e.g., ICAO VSD-NC, DIVOC, LACPass, SMART Health Cards) specifications. 

From https://www.who.int/initiatives/global-digital-health-certification-network

On the surface it sounds great, but we’ll see what happens when it goes live (Borak states that the go-live date is July 1).

And we’ll see how it expands:

To facilitate the uptake of the EU DCC by WHO and contribute to its operation and further development, WHO and the European Commission have agreed to partner in digital health.

This partnership will work to technically develop the WHO system with a staged approach to cover additional use cases, which may include, for example, the digitisation of the International Certificate of Vaccination or Prophylaxis. Expanding such digital solutions will be essential to deliver better health for citizens across the globe.

From https://www.who.int/news/item/05-06-2023-the-european-commission-and-who-launch-landmark-digital-health-initiative-to-strengthen-global-health-security

And most importantly, we’ll see which countries participate—and which countries don’t.

Why Writer.com Approaches Generative AI Writing Differently Than I Do

About two weeks ago, I asked myself the question “How Soon Will I Have to Change My Temperamental Writer Generative AI Suggestions/Rule?

Perhaps that time has come.

Perhaps not.

What are my temperamental writer generative AI suggestions and rule?

If you haven’t seen my June 5 blog post or my June 13 LinkedIn article on this topic, here is a brief recap of how I use generative AI in my writing:

Designed by Freepik.
  • Suggestion 1: A human should always write the first draft.
  • Suggestion 2: Only feed bits to the generative AI tool.
  • An ironclad rule: Don’t share confidential information with the tool.

This post will focus on the first suggestion, although the ironclad rule will come up in the discussion also.

There are several reasons why I believe that a human should write the first draft, and the generative AI tool should only be used to improve the draft. Two of these reasons (I won’t get into the ego part) are as follows:

  • Iterate on my work to make it better. For me, the process of writing itself lets me tweak the text throughout the written content. In my view this makes the first draft much better, which makes the final version even better still.
  • Control the tone of my writing. One current drawback of generative AI is that, unless properly prompted, it often delivers bland, boring text. Creating and iterating the text myself lets me dictate the tone of voice and eliminates the need to rewrite the whole thing later to change the tone.

However, there is one drawback to my method. It takes a lot longer.

  • If you submit a prompt to a generative AI tool and receive results in a minute, and if you tweak the prompt four times to make it better, you’ll have a complete first draft in five minutes.
  • Using my method, I don’t create a first draft in five minutes. It usually takes me between 60 and 120 minutes (not counting “sleep on it” time) to crank out a first draft the old fashioned way.

Let’s look at a different way to use generative AI in writing.

What is writer.com?

The Content Marketing Institute recently hosted a three-day series of webinars on content marketing called ContentTECH 2023.

One of the sessions, “Generative AI FTW: Must-Have Use Cases and Requirements for Success,” was presented by Alex Wettreich (LinkedIn, Twitter) of Writer, which promotes itself as providing the “AI platform built for the enterprise.”

This isn’t your general-purpose generative AI tool that throws everyone’s prompts into the same data warehouse. This is truly a tool for your enterprise:

Unlike other large language models, Palmyra, our family of LLMs, is built for business….

Ability to self-host: Offered as self-hosted option. Own, host, and customize your own version of our LLM.

From https://writer.com/platform/

Guess what this means? All of my personal concerns about sharing confidential data with a generative AI tool are eliminated. Read Writer’s Terms of Service:

7.1. Ownership.  All data, information, files, or other materials and content that Customer makes available to Company for the purpose of utilizing the Service (including, without limitation, training data, prompt inputs, and drafts) (“Customer Content”) shall remain the sole property of Customer. Customer shall retain all intellectual property rights in the Customer Content. Company does not screen Customer Content, is not responsible for storing or maintaining backups of any Customer Content, and is not responsible for the content of or any use by Customer of the Customer Content.

From https://writer.com/terms/

Now that we’ve talked about the basics of Writer, let’s see how it creates content.

What is writer.com’s generative AI writing process?

With Writer, the generative AI tool writes the first draft.

[W]hat we did at Writer was simple: customers already had their style guides built into Writer — their writing style, terminology, and must-have language. We used that plus samples of customers’ best blog posts, help articles, headlines, email subject lines, ads, and more. Writer can create first drafts that are significantly better than other tools because the content is modeled off your best content and trained on your voice.

From https://writer.com/blog/generative-ai-capabilities/

The training data is important. A marketer who uses Writer is guided along the way.

“Create a unique, consistent, and relatable voice that shines through every communication touch point — at scale. Your marketing team doesn’t have time for the copyediting (or scolding).”

“Keep your editorial guidelines up-to-date and easy to access. From punctuation to capitalization rules to grade level and specific terminology, put all your guidance in one place.”

“Make your core messaging easy to repeat. Keep company voice, terms, and boilerplate consistent, no matter who’s writing.”

From https://writer.com/use-cases/marketing/

But is Writer’s output as bland as the reputed “style” from other generative AI tools? If it is, then you won’t save any time by using Writer, since you’ll have to rewrite everything to fit your tone of voice anyway.

Now I haven’t tested Writer, but Trello has. And it sounds like Trello’s tone of voice has been preserved even when the bots write the content.

From trello.com.

Trello avoids the “professional voice” trap traditional software companies fall into (aka stodgy, robotic tone) by treating the person who reads their content like a coworker….With phrases like “go from Trello zero to Trello hero,” you can see that the writers at Trello had permission and encouragement to have fun while writing help content, and that fun translates to a delightful experience for users….

Leah Ryder told us, “With the 10-year anniversary of Trello around the corner, combined with major developments in-product with the new Views feature, it seemed like the right time to update and align our brand and product towards our shared goal of empowering productivity for teams everywhere.”…

Trello’s brand refresh was 1.5 years in the making, and it took a tremendous amount of strategic leadership, partnered with cross-team collaboration to make it happen. It couldn’t have happened without ten years of defining and committing to rule-breaking brand principles. Over the next decade, there’s no doubt the product will change as it adapts to user needs, but with strong brand principles in place, Trellists can always expect a sense of joy built into everything Trello creates.

From https://writer.com/blog/trello-brand-refresh/

The guidance provided by Writer ensures that Trello continues to sound…Trello-y, even after Trello became a small part of Atlassian.

What does this mean?

So if Writer and Trello are correct in their assertions, it IS possible for a well-designed generative AI tool to create a first draft that does NOT require extensive rewrites. Or, if you control your data warehouse, fact-checking. This preserves the ability to save time, since you don’t have to rewrite bland text or correct inaccurate text.

Of course, you have to buy Writer. As of today, Writer’s price for a team of five or fewer people is $18/user/month. Talk to them if you want a larger offering for your entire enterprise.

The people who review for G2 have identified alternatives to Writer, including some well-known names such as Grammarly, Jasper, and Notion. As time goes on, the major players such as Microsoft will incorporate AI into existing and new products, but whether these tools will allow tone of voice specification and privacy preservation remains to be seen.

Let’s see how long my “human drafts first” suggestion lasts.

Three Ways to Identify and Share Your Identity Firm’s Differentiators

(Part of the biometric product marketing expert series)

Are you an executive with a small or medium sized identity/biometrics firm?

If so, you want to share the story of your identity firm. But what are you going to say?

How will you figure out what makes your firm better than all the inferior identity firms that compete with you?

How will you get the word out about why your identity firm beats all the others?

Are you getting tired of my repeated questions?

Are you ready for the answers?

Your identity firm differs from all others

Over the last 29 years, I (John E. Bredehoft of Bredemarket) have worked for and with over a dozen identity firms, either as an employee or as a consultant.

You’d think that since I have worked for so many different identity firms, it’s an easy thing to start working with a new firm by simply slapping down the messaging that I’ve created for all the other identity firms.

Nothing could be further from the truth.

Designed by Freepik.

Every identity firm needs different messaging.

  • The messaging that I created in my various roles at IDEMIA and its corporate predecessors was dramatically different than the messaging I created as a Senior Product Marketing Manager at Incode Technologies, which was also very different from the messaging that I created for my previous Bredemarket clients.
  • IDEMIA benefits such as “servicing your needs anywhere in the world” and “applying our decades of identity experience to solve your problems” are not going to help with a U.S.-only firm that’s only a decade old.
  • Similarly, messaging for a company that develops its own facial recognition algorithms will necessarily differ from messaging for a company that chooses the best third-party facial recognition algorithms on the market.

So which messaging is right?

It depends on who is paying me.

How your differences affect your firm’s messaging

When creating messaging for your identity firm, one size does not fit all, for the reasons listed above.

The content of your messaging will differ, based upon your differentiators.

  • For example, if you were the U.S.-only firm established less than ten years ago, your messaging would emphasize the newness of your solution and approach, as opposed to the stodgy legacy companies that never updated their ideas.
  • And if your firm has certain types of end users, such as law enforcement users, your messaging would probably feature an abundance of U.S. flags.

In addition, the channels that you use for your messaging will differ.

Identity firms will not want to market on every single social media channel. They will only market on the channels where their most motivated buyers are present.

  • That may be your own website.
  • Or LinkedIn.
  • Or Facebook.
  • Or Twitter.
  • Or Instagram.
  • Or YouTube.
  • Or TikTok.
  • Or a private system only accessible to people with a Top Secret Clearance.
  • Or display advertisements located in airports.
From https://www.youtube.com/watch?v=H02iwWCrXew

It may be more than one of these channels, but it probably won’t be all of them.

But before you work on your content or channels, you need to know what to say, and how to communicate it.

How to know and communicate your differentiators

As we’ve noted, your firm is different than all others.

  • How do you know the differences?
  • How do you know what you want to talk about?
  • How do you know what you DON’T want to talk about?

Here are three methods to get you started on knowing and communicating your differentiators in your content.

Method One: The time-tested SWOT analysis

If you talk to a marketer for more than two seconds about positioning a company, the marketer will probably throw the acronym “SWOT” back at you. I’ve mentioned the SWOT acronym before.

For those who don’t know the acronym, SWOT stands for

  • Strengths. These are internal attributes that benefit your firm. For example, your firm is winning a lot of business and growing in customer count and market share.
  • Weaknesses. These are also internal attributes, but in this case the attributes that detract from your firm. For example, you have very few customers.
  • Opportunities. These are external factors that enhance your firm. One example is a COVID or similar event that creates a surge in demand for contactless solutions.
  • Threats. The flip side is external factors that can harm your firm. One example is increasing privacy regulations that can slow or halt adoption of your product or service.

If you’re interested in more detail on the topic, there are a number of online sources that discuss SWOT analyses. Here’s TechTarget’s discussion of SWOT.

The common way to create the output from a SWOT analysis is to create four boxes and list each element (S, W, O, and T) within a box.

By Syassine – Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=31368987

Once this is done, you’ll know that your messaging should emphasize the strengths and opportunities, and downplay or avoid the weaknesses and threats.

Or alternatively argue that the weaknesses and threats are really strengths and opportunities. (I’ve done this before.)

Method Two: Think before you create

Personally, I believe that a SWOT analysis is not enough. Before you use the SWOT findings to create content, there’s a little more work you have to do.

I recommend that before you create content, you should hold a kickoff of the content creation process and figure out what you want to do before you do it.

During that kickoff meeting, you should ask some questions to make sure you understand what needs to be done.

I’ve written about kickoffs and questions before, and I’m not going to repeat what I already said. If you want to know more:

Method Three: Send in the reinforcements

Now that you’ve locked down the messaging, it’s time to actually create the content that differentiates your identity firm from all the inferior identity firms in the market. While some companies can proceed right to content creation, others may run into one of two problems.

  • The identity firm doesn’t have any knowledgeable writers on staff. To create the content, you need people who understand the identity industry, and who know how to write. Some firms lack people with this knowledge and capability.
  • The identity firm has knowledgeable writers on staff, but they’re busy. Some companies have too many things to do at once, and any knowledgeable writers that are on staff may be unavailable due to other priorities.
Your current staff may have too much to do. By Backlit – Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=12225421

This is where you supplement you identity firm’s existing staff with one or more knowledgeable writers who can work with you to create the content that leaves your inferior competitors in the dust.

What is next?

So do you need a knowledgeable biometric content marketing expert to create your content?

One who has been in the biometric industry for 29 years?

One who has been writing short and long form content for more than 29 years?

Are you getting tired of my repeated questions again?

Well then I’ll just tell you that Bredemarket is the answer to your identity/biometric content marketing needs.

Are you ready to take your identity firm to the next level with a compelling message that increases awareness, consideration, conversion, and long-term revenue? Let’s talk today!

Why Your Business Needs an Obsessive Content Marketer

Compulsions and obsessions can be bad things, or they can be good things if channeled correctly.

What if Bredemarket provided me an outlet to chnnel my compulsions and obsessions to help your business grow?

Compulsions and obsessions

I recently wrote a three-post series (first post in the series here) that frequently used the word “compulsion.”

I almost used the word “obsession” in conjunction with the word compulsion, but decided not to make light of a medical condition that truly debilitates some people.

I used the word compulsion to refer to two things about me:

Writing compulsion, or writing obsession. Designed by Freepik.

While compulsions and obsessions can certainly be bad things, when harnessed properly they can provide good for the world.

Like a butterfly.

Animotion on embracing an obsession

When people of a certain age hear the word “obsession,” they may think of the 1980s song by the band Animotion.

From https://www.youtube.com/watch?v=hIs5StN8J-0

Unfortunately for us, 90% of the song deals with the negative aspects of a person obsessing over another person. If you pick through the lyrics of the Animotion song “Obsession” and forget about what (or who) the singer is obsessing about, you can find isolated phrases that describe how an obsession can motivate you.

  • “I cannot sleep”
  • “Be still”
  • “I will not accept defeat”

But thankfully, there are more positive ways to embrace an obsession.

Justin Welsh on embracing an obsession

While Justin Welsh’s July 2022 post “TSS #028: Don’t Pick a Niche. Embrace an Obsession” is targeted for solopreneurs, it could just as easily apply to those who work for others. Regardless of your compensation structure, why do you choose to work where you do?

For Welsh, the practice of picking a niche risks commoditization.

They end up looking like, sounding like, and acting like all of their competition. The internet is full of copycats and duplicates.

From https://www.justinwelsh.me/blog/dont-pick-a-niche-embrace-an-obsession

(For example, I’d bet that all of the people who are picking a niche know better than to cite the Animotion song “Obsession” in a blog post promoting their business.)

Perhaps it’s semantics, but in Welsh’s way of thinking, embracing an obsession differs from picking a niche. To describe the power of embracing an obsession, Welsh references a tweet from Daniel Vassalo:

Find something you want to do really badly, and you won’t need any goals, habits, systems, discipline, rewards, or any other mental hacks. When the motivation is intrinsic, those things happen on their own.

From https://twitter.com/dvassallo/status/1547230105805754369

I trust you can see the difference between picking something you HAVE to do, versus obsessing over something you WANT to do.

What’s in it for you?

Welsh was addressing this post to me and people like me, and his message resonates with me.

But frankly, YOU don’t care about me and about whether I’m motivated. All that you care about is that YOU get YOUR content that you need from me.

So why should you care what Justin Welsh and Daniel Vassllo told me?

The obvious answer is that if you contract with Bredemarket for your marketing and writing services, you’ll get a “pry my keyboard out of my cold dead hands” person who WANTS to write your stuff, and doesn’t want to turn the writing process over to some two-year-old bot (except for very small little bits).

Regarding the use of two-year-old bots:

“Pry my keyboard,” indeed.

Do you need someone to obsess over YOUR content?

Of course, if you need someone to write YOUR stuff, then I won’t have time to work on a TikTok dance. This is a good thing for me, you, and the world.

As I’ve stated elsewhere, before I write a thing for a Bredemarket client, I make sure that I understand WHY you do what you do, and understand everything else that is relevant to the content that we create.

As I work on the content, you have opportunities to review it and provide your feedback. This ensures that both of us are happy with the final copy.

And that your end users become obsessed with YOU.

So if you need me to create content for you, please contact me.

Feel free to share YOUR favorite 1980s song if you like.

Even if it’s THIS song that your favorite temperamental writer detests.

From https://www.youtube.com/watch?v=aDgHXiWgKlE

Fill Your Company Gap With A Biometric Content Marketing Expert

Companies often have a lot of things they want to do, but don’t have the people to do them. It takes a long time to hire someone, and it even takes time to find a consultant that knows your industry and can do the work.

This affects identity/biometric companies just like it affects other companies. When an identity/biometric company needs a specific type of expertise and needs it NOW, it’s often hard to find the person they need.

If your company needs a biometric content marketing expert (or an identity content marketing expert) NOW, you’ve come to the right place—Bredemarket. Bredemarket has no identity learning curve, no content learning curve, and offers proven results.

Identity/biometric consulting in the 1990s

I remember when I first started working as an identity/biometric consultant, long before Bredemarket was a thing.

OK, not quite THAT long ago. I started working in biometrics in the 1990s—NOT the 1940s.

In 1994, the proposals department at Printrak International needed additional writers due to the manager’s maternity leave, and she was so valuable that Printrak needed to bring in TWO consultants to take her place.

At least initially, the other consultant and I couldn’t fill the manager’s shoes.

Designed by Freepik.
  • Both of us could write.
  • Both of us could spell “AFIS.”
  • Both of us could spell “RAID.” Not the bug spray, but the storage mechanism that stored all those “huge” fingerprint images.
  • But on that first night that I was cranking out proposal letters for something called a “Latent Station 2000,” I didn’t really know WHAT I was writing about.

As time went on, the other consultant and I learned much more—so much that the company brought both of us on as full-time employees.

After we were hired full-time, we spent a combined 45+ years at Printrak and its corporate successors in proposals, marketing, and product management positions, contributing to industry knowledge.

Which shows that learning how to spell “AFIS” can have long-term benefits.

Printrak’s problem

When Printrak needed biometric proposal writing experts quickly, it found two people who filled the bill. Sort of.

But neither of us knew biometrics before we started consuting at Printrak.

And I had never written a proposal before I started consulting at Printrak. (I had written an RFP. Sort of.)

But frankly, there weren’t a lot of identity/biometric consultants out in the field in the 1990s. There were the 20th century equivalents of Applied Forensic Services LLC, but at the time I don’t think there were any 20th century equivalents of Tandem Technical Writing LLC.

The 21st century solution

Unlike the 1990s, identity/biometric firms that need consulting help have many options. In addition to Applied Forensic Services and Tandem Technical Writing you have…me.

Mike and Laurel can tell you what they can do, and I heartily endorse both of them.

Let me share with you why I call myself a biometric content marketing expert who can help your identity/biometric company get marketing content out now:

  • No identity learning curve
  • No content learning curve
  • Proven results

No identity learning curve

I have worked with finger, face, iris, DNA, and other biometrics, as well as government-issued identity documents and geolocation. If you are interested, you can read my Bredemarket blog posts that mention the following topics:

No content learning curve

Because I’ve produced both external and internal content on identity/biometric topics, I offer the experience to produce your content in a number of formats.

  • External content: account-based marketing content, articles, blog posts (I am the identity/biometric blog expert), case studies, data sheets, partner comarketing content, presentations, proposals, sales literature sheets, scientific book chapters, smartphone application content (events), social media posts, web page content, and white papers.
  • Internal content: battlecards, competitive analyses, demonstration scripts (events), email internal newsletters, FAQs, multi-year plans, playbooks, project plans, proposal templates, quality improvement documents, requirements documents, strategic analyses, and website/social media analyses.

Proven results

Read about them here.

So how can you take advantage of my identity/biometric expertise?

If you need day-one help for an identity/biometric content marketing or proposal writing project, consider Bredemarket.

Pilots, Co-Pilots, and Marketing and Writing Services

I’ve always been amused by this bumper sticker saying.

The phrase “God is my co-pilot,” taken from pilot Robert L. Scott Jr.’s World War II autobiography of the same name, superficially appears to depict a fervent religious devotion.

But look at it again.

Military pilots have a huge reputation for supersized egos. Not that I necessarily have a problem with egos, but this must be recognized. And the phrase above bears it out.

  • Scott is the pilot, in charge of things.
  • God is the co-pilot, subservient to Scott’s every command. Heck, since Scott runs the show, God might as well be a mere passenger.

But this is not only a religious issue.

Who controls artificial intelligence?

If you’re going to employ generative artificial intelligence (generative AI) to create your written work, you need to decide who will be the pilot, and who will be the co-pilot.

  • You could send the prompt off to your favorite generative AI tool and let it shape the words you will communicate to your customers. In this case, the tool is the pilot, and you’re just the co-pilot.
Designed by Freepik.

(The perceptive ones among you have already noted that I treat text and images differently. In the image above, I clearly took the co-pilot’s seat and let Freepik pilot the process. My raving egotism does not extend to my graphic capabilities.)

This concept of AI as a co-pilot rather than a pilot is not just my egotistical opinion.

When GitHub implemented its generative AI coding solution, it named the solution “GitHub Copilot.” The clear implication is that the human coder is still running the show, while GitHub Copilot is helping out its boss.

But enough about generative AI. Heaven knows I’ve been spouting off about that a lot lately. Let’s turn to another topic I spout off about a lot—how you should work with your content creator to generate your content marketing text.

Who should pilot a content marketing project?

Assume for the moment that your company has decided NOT to entrust its content marketing text to a generative AI tool, and instead has contracted with a human content marketing expert to create the text.

Again, there are two ways to approach the task.

  • The first approach is to yield all control to the expert. You sit back, relax, and tell your content marketing consultant to do whatever they want. They provide the text, and you pay the consultant with no questions asked. The content marketing consultant is the pilot here.
  • The second approach is to retain all control yourself. You tell the content marketing consultant exactly what you want, and exactly what words to say to describe your best-of-breed, game-changing, paradigm-shifting, outcome-optimizing solution. (That last sentence was painful to write, but I did it for you.) The content marketing consultant follows your exact commands and produces the copy with the exact words you want. You are the pilot here.

So which of these two methods is the best way to create content?

As far as I’m concerned, neither of them.

Which is why Bredemarket doesn’t work that way.

Can two people pilot a content marketing project?

Bredemarket’s preferred content creation process is a collaborative one, in which you and I both control the process. While in the end you are the de facto pilot since you control the purse-strings, Bredemarket emphasizes and follows this collaborative approach.

Throughout this collaborative and iterative package we both pilot the process, and we both contribute our unique strengths to produce the final written product.

Are you ready to collaborate?

If you have content marketing needs that Bredemarket can help you achieve, let me know and we’ll talk about how to pilot a content marketing project together.

Testing My Sixth Authentication Factor on One Real and Two Imagined Corporate Office Visits

This is the third post in a series on my proposed sixth factor of authentication.

Perhaps you’ve heard people say there are three factors of authentication, or four factors of authentication, or five factors of authentication.

But what if there are six?

I know what you’re thinking, punk. You’re thinking: did he define 6 factors of authentication, or only 5? (Repurposing Dirty Harry, whose sixth bullet must have 404’ed.)

By unknown – Screenshot from the DVD version of the 1971 film Dirty Harry, extracted from Harry’s infamous “do ya feel lucky” monologue, Fair use, https://en.wikipedia.org/w/index.php?curid=6867681

Introduction: what are factors of authentication, anyway?

Authentication is the process of determining whether a person is truly THE person who is associated with a particular account, such as a computer login or a bank account.

Five authentication factors

There are many ways in which you can authenticate yourself, but (as I previously noted before starting the “6fa” series) all of these methods fall into up to five general categories, or “factors.”

  1. Something you know.
  2. Something you have.
  3. Something you are.
  4. Something you do.
  5. Somewhere you are.

By the way, if you provide a password, a PIN, your mother’s maiden name, and the name of your favorite pet, that is not four authentication factors, but four instances of the same authentication factor (something you know). And this is not a recipe for robust security.

For another example of multiple uses of the same factor, see kao’s post in Life in Hex.

What if there is a sixth authentication factor?

In April 2022, while I was consulting for the identity industry but not employed by it, I proposed a sixth authentication factor.

I’d like to propose a sixth authentication factor.

What about the authentication factor “why”?

This proposed factor, separate from the other factors, applies a test of intent or reasonableness to any identification request.

From https://bredemarket.com/2022/04/12/the-sixth-factor-of-multi-factor-authentication-you-heard-it-here-first/

Testing my theory

Two months later, I was employed in the identity industry, and therefore Bredemarket was pivoting away from identity consulting. But I was still musing about identity topics that had nothing to do with my employment, and decided to test my sixth authentication factor theory on a case in which a person, or possibly multiple persons, were boarding buses.

After I laid out the whole story, which involved capturing the times at which a person (or persons) boarded a bus, I wondered if there were really just five authentication factors after all.

Now I’ll grant that “why?” might not be a sixth factor of authentication at all, but may fall under the existing “something you do” category. This factor is normally reserved for gestures or touches. For example, some facial liveness detection methods require you to move your head up, down, right, or left on command to prove that you are a real person. But you could probably classify boarding a bus as “something you do.”

From https://bredemarket.com/2022/07/24/testing-my-sixth-authentication-factor-on-omnitrans-bus-passes/

So I tried to think of a “why” action that couldn’t be classified as “something you do.” But I didn’t think that hard, because I was busy in my day job, and I didn’t really need 6fa in my non-identity consulting work.

Well, that changed. So I’m revisiting the 6fa issue again, and this time I’ve devised a new test in which I visit two buildings over the course of three months. Can the sixth authentication factor truly confirm or deny my identity?

Why am I visiting a corporate office?

For this test, I will examine three instances—one real, two imagined—in which I visited a corporate office associated with a well-known identity verification firm.

No, not THAT firm. By Arne Müseler / http://www.arne-mueseler.com, CC BY-SA 3.0 de, https://commons.wikimedia.org/w/index.php?curid=78985341

As I consider whether I should be authenticated to enter the facility in question, I will use my proposed “why?” factor to measure whether there is a reasonable intent for me to be present, which could determine whether I pass or fail authentication.

Visit number one, April 2023

This visit really happened. One day I presented myself at a corporate office to be authenticated for entry.

If we use my six factors of authentication, should I be allowed in?

Let’s start with the first five factors:

  • Something you know, have, and are. Without disclosing confidential information about the corporate office’s security procedures, I can simply say that I satisfied all three of these factors.
  • Something you do. It is a matter of public record that the corporation that controls this corporate office does not employ active liveness, but instead employs passive liveness. Therefore I can disclose that when visiting this corporate office, I didn’t have to shake my head in one hundred different directions to prove that I was a live person.
  • Somewhere you are. It sounds silly, but let’s ask the question anyway. If I want to physically enter a corporate office, am I at that corporate office? It is possible to detect that my phone is there (something you have), but does that necessarily mean that I am there (something you are)? To simplify things, let’s assert that I passed the “somewhere you are” test, and that I was truly outside of the corporate office, waiting to get in.

Now let’s apply the sixth factor, why/intent/reasonableness. Was there a reason why I was standing outside the office door?

In this case, there was a reason why I was there. I was a member of the Marketing Department, and the entire Marketing Department was gathering for a week-long meeting at the corporate office. So my presence there was legitimate.

Authentication: PASSED.

Visit number two, June 2023

This visit never happened except in my imagination. But would would have occurred if I had presented myself at the corporate office this month?

Let’s start by going through the five authentication factors again.

  • Something you know, have, and are. Without disclosing confidential information, I can simply say that in this instance I would have failed at least one of the three authentication factors. Obviously not the “something you are” factor, since I was still the same person that I was two months previously, but I would have failed at least one of the other two.
  • Something you do. Again, no liveness testing, so “something you do” would not apply.
  • Somewhere you are. Let’s assert that I would have again passed the “somewhere you are” test, and that I was truly outside of the corporate office, waiting to get in.

So I’ve already failed one or two of the five authetication factors, but would I fail the sixth?

Yes, because there was no valid reason for me to enter the corporate office.

Why not?

Because by June 2023 I was no longer an employee, and therefore had no intent or reason to visit the corporate office. I didn’t work there, after all.

(And incidentally, this is why I would have failed one or two of the other authentication factors. Because I was no longer an employee, I no longer knew something and/or had something I needed to enter the office.)

Authentication: FAILED.

Visit number three, June 2023

This visit never happened either, except in my imagionation. Let’s assume all of the facts from visit number two, with one critical exception: I arrived at the corporate office carrying computer equipment.

So how does the authentication process unfold now?

  • Something you know, have, and are. The presence of computer equipment would not have changed these three authentication factors. I still would have passed the “something you are” factor and failed one or both of the other two. (In this instance, computer equipment does not count as “something you have.”)
  • Something you do. Again, no liveness testing, so “something you do” would not apply.
  • Somewhere you are. Let’s assert that I would have again passed the “somewhere you are” test, and that I was truly outside of the corporate office, waiting to get in.

Now let’s turn to the sixth authentication factor. No, I am not a current employee who is usually entitled to visit the corporate office, but my possession of computing equipment introduces a new variable into the why/intent/reasonableness factor.

Why? Because the computer equipment belonged to the company, and in this instance I would have been visiting the corporate office to return the computer equipment to the company.

Authentication: PASSED.

So I guess there IS a sixth authentication factor

And there you have it.

In visits number two and three, all of the standard five authentication factors provided identical results. In both instances:

  • I passed the something you are test.
  • I failed the something you know and/or the something you have test.
  • Something you do was never tested.
  • I passed the somewhere you are test.

But for visit number two authentication failed, while for visit number three authentication passed, solely on the basis of the sixth authentication factor. I had no valid reason to be at the corporate office…except to return the company’s equipment.

So the sixth authentication factor exists in theory, but it will take some work to make it a reality.

By en:User:Cburnett – This W3C-unspecified vector image was created with Inkscape ., CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=1496812

So now how do I make a ton of money by bringing this sixth authentication factor to market?

As I said over a year ago…

Maybe I should speak to a patent attorney.

From https://bredemarket.com/2022/04/12/the-sixth-factor-of-multi-factor-authentication-you-heard-it-here-first/