<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: numa</title>
    <description>The latest articles on DEV Community by numa (@milnuma).</description>
    <link>https://dev.to/milnuma</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3733238%2F85ea9155-1799-4e79-be03-28218725073f.jpg</url>
      <title>DEV Community: numa</title>
      <link>https://dev.to/milnuma</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/milnuma"/>
    <language>en</language>
    <item>
      <title>What Is Information Structure? Foundations of a New Security Architecture</title>
      <dc:creator>numa</dc:creator>
      <pubDate>Sat, 31 Jan 2026 11:23:43 +0000</pubDate>
      <link>https://dev.to/milnuma/what-is-information-structure-1b66</link>
      <guid>https://dev.to/milnuma/what-is-information-structure-1b66</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkiavczu3xcudwujtr9rt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkiavczu3xcudwujtr9rt.jpg" alt=" " width="640" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Even if we say that humans are made of information structures, few people would believe it.&lt;br&gt;
After all, the human body is entirely a physical structure.&lt;/p&gt;

&lt;p&gt;However, consider a person introducing themselves.&lt;br&gt;
Is the content of that introduction a description of their physical structure? No.&lt;br&gt;
When people introduce themselves, they convey information structures such as name, address, age, and other personal attributes.&lt;/p&gt;

&lt;p&gt;In other words, the essence of a human being is an information structure built upon a physical structure.&lt;br&gt;
Announcing one’s name is actually presenting a highly sophisticated information structure, though people take it for granted and rarely notice.&lt;/p&gt;

&lt;p&gt;If we understand information structures, we can design more advanced security systems.&lt;br&gt;
By applying the mechanisms of information structures, it is possible to achieve unprecedented defensive capabilities in security design.&lt;br&gt;
Adding the perspective of information structures to the real world allows us to reconsider and improve security design.&lt;/p&gt;

&lt;p&gt;Humans as Information&lt;/p&gt;

&lt;p&gt;If humans are composed of information structures, then all interactions can be seen as handling information.&lt;br&gt;
There is no contradiction here.&lt;/p&gt;

&lt;p&gt;Communication between humans can be understood as the exchange of information.&lt;br&gt;
Mutual understanding is built upon accumulated information.&lt;/p&gt;

&lt;p&gt;When a person reads a book and comprehends its content, then acts upon it, this process involves receiving, interpreting, and executing information.&lt;br&gt;
From this perspective, humans can be considered to be made of information.&lt;/p&gt;

&lt;h2&gt;
  
  
  There Is No Matter Without Information Structures
&lt;/h2&gt;

&lt;p&gt;Furthermore, all matter inherently has information structures.&lt;br&gt;
There is no matter without information.&lt;/p&gt;

&lt;p&gt;Even when sunlight reaches us, we first perceive the information of the sun through light before feeling its heat.&lt;br&gt;
Physically, our perception starts with information carried by light, followed by the heat and energy generated by the sun.&lt;/p&gt;

&lt;p&gt;By analyzing the received information structures, we can understand the structures contained in the source.&lt;br&gt;
The key point is that information (light) reaches us faster than heat or force.&lt;/p&gt;

&lt;p&gt;The Apple Example&lt;/p&gt;

&lt;p&gt;Let’s consider an apple.&lt;/p&gt;

&lt;p&gt;Suppose you have a single apple and cut it in half.&lt;br&gt;
Which comes first: the physical division or the information structure?&lt;/p&gt;

&lt;p&gt;This may seem like wordplay, but in fact, the apple becomes “two” as an information state, determined when the apple’s identity (name) is divided.&lt;/p&gt;

&lt;p&gt;Unless the information is divided, it remains a single apple in a divided state.&lt;/p&gt;

&lt;p&gt;Information structures allow the two halves to exist conceptually before the physical act of cutting.&lt;/p&gt;

&lt;p&gt;Once divided, the apple rarely returns to a single whole.&lt;br&gt;
Moreover, the cut surface contains irreversible information about the division.&lt;/p&gt;

&lt;p&gt;Physical Phenomena as Information&lt;/p&gt;

&lt;p&gt;When we analyze physical phenomena, the data we collect may appear to be purely physical.&lt;br&gt;
However, the essence of that data is an information structure.&lt;/p&gt;

&lt;p&gt;That is, when we quantify physical phenomena, we are accessing the underlying information structure of the physical world.&lt;/p&gt;

&lt;p&gt;You might then wonder: are humans able to process the information structures of matter?&lt;/p&gt;

&lt;p&gt;In reality, humans only perceive an abstraction of information structures via the senses or measuring instruments.&lt;br&gt;
We do not yet have a protocol to fully read information structures.&lt;/p&gt;

&lt;p&gt;Humans can access only part of the information structures inherent in matter.&lt;br&gt;
This is because we have not yet defined matter as inherently possessing information structures.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is “Identity”?
&lt;/h2&gt;

&lt;p&gt;So, what exactly is an information structure? Let us analyze it.&lt;/p&gt;

&lt;p&gt;Information structures contain what I call identity.&lt;br&gt;
Identity determines ownership of an information structure.&lt;/p&gt;

&lt;p&gt;Information without ownership cannot exist and is thus particularly important.&lt;br&gt;
An information structure without a label cannot be realized.&lt;/p&gt;

&lt;p&gt;Identity, Authority, Authentication&lt;/p&gt;

&lt;p&gt;Take a driver’s license as an example to illustrate identity, authority, and authentication:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity = Name, birth date, photo — representing the person.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authority = Permission, e.g., the right to drive a car&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication = Presentation to an external entity, e.g., a police officer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Each of these alone has no meaning.&lt;br&gt;
Combined, they form a functional driver’s license.&lt;/p&gt;

&lt;p&gt;Although a driver’s license is typically treated as a single object, it is in fact a collection of three information structures.&lt;/p&gt;

&lt;p&gt;Identity alone is just a label.&lt;br&gt;
Authority alone cannot act without identity.&lt;br&gt;
Authentication alone is meaningless without the other two.&lt;/p&gt;

&lt;p&gt;The driver’s license demonstrates how humans unconsciously embed and utilize information structures in society.&lt;/p&gt;

&lt;p&gt;Applying Information Structures to Security&lt;/p&gt;

&lt;p&gt;Earlier, I mentioned that information structures can be applied to security.&lt;br&gt;
The principle is simple:&lt;/p&gt;

&lt;p&gt;Physically separate identity and authority.&lt;/p&gt;

&lt;p&gt;When physically separated, the parts seem unusable.&lt;br&gt;
However, reconnect them momentarily when needed.&lt;/p&gt;

&lt;p&gt;Measures like Zero Trust principles ensure security during connection.&lt;/p&gt;

&lt;p&gt;Separating identity and authority in this manner is highly effective.&lt;br&gt;
Even quantum computing cannot compromise this structural separation because no central secret exists.&lt;/p&gt;

&lt;p&gt;All that remains is to make reconnection convenient for the user.&lt;br&gt;
This is the foundation of a trust architecture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Properties of Identity
&lt;/h2&gt;

&lt;p&gt;Identity in information structures has properties similar to electrons in physics.&lt;/p&gt;

&lt;p&gt;It can change instantaneously but retains the integrity of its structure.&lt;br&gt;
In other words, identity maintains its uniqueness even when dynamically changing.&lt;/p&gt;

&lt;p&gt;However, this property cannot be arbitrarily modified.&lt;/p&gt;

&lt;p&gt;Unlike electrons, which exist in large numbers, identity is singular for each information structure.&lt;/p&gt;

&lt;p&gt;Duplicating it creates multiple conflicting structures, breaking its singularity.&lt;/p&gt;

&lt;p&gt;Therefore, there is not one identity per physical structure but one identity per information structure.&lt;/p&gt;

&lt;p&gt;This property can be used to create information structures that cannot be copied.&lt;/p&gt;

&lt;p&gt;Just as electrons occupy specific orbits, identity must have an authority orbit to manifest as authentication.&lt;/p&gt;

&lt;p&gt;Authentication presents this structure to the outside world.&lt;/p&gt;

&lt;p&gt;Information is dynamic, but identity retains its essence.&lt;/p&gt;

&lt;p&gt;The relationship between identity, authority, and authentication resembles electron, orbital, and measurement in physics.&lt;/p&gt;

&lt;p&gt;Identity and authority interact in a way analogous to minimal authentication units.&lt;/p&gt;

&lt;p&gt;Physical Carriers&lt;/p&gt;

&lt;p&gt;Information structures cannot exist alone except in a black hole.&lt;/p&gt;

&lt;p&gt;They require a physical medium — hardware, body, paper, or device — to exist.&lt;/p&gt;

&lt;p&gt;Exceptions exist where information structures are carried by light (photons).&lt;/p&gt;

&lt;p&gt;Hence, the minimal unit for carrying information may be light.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Information structures are still unrecognized entities, but humans unconsciously use them in all sensory perception and communication.&lt;/p&gt;

&lt;p&gt;They are invisible, yet they consistently manifest in our actions and conversations.&lt;/p&gt;

&lt;p&gt;It is impossible to prove their nonexistence:&lt;br&gt;
“not found” itself is information — proof that something exists as an information structure.&lt;/p&gt;

&lt;p&gt;Information structures are not tangible entities; they are the rules underlying phenomena.&lt;/p&gt;

&lt;p&gt;Various fields are beginning to recognize the presence of information structures.&lt;/p&gt;

&lt;p&gt;This remains a cutting-edge topic.&lt;/p&gt;

&lt;p&gt;While one can debate whether information or matter comes first, what matters is understanding the structures that humans unconsciously employ.&lt;/p&gt;

&lt;p&gt;Exploring information structures is fundamental to human evolution.&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>computerscience</category>
      <category>data</category>
      <category>security</category>
    </item>
    <item>
      <title>Security Risks of Mobile Authentication: Smartphone Login Is Unsafe</title>
      <dc:creator>numa</dc:creator>
      <pubDate>Mon, 26 Jan 2026 15:51:50 +0000</pubDate>
      <link>https://dev.to/milnuma/rethinking-authentication-a-two-card-distributed-security-model-163e</link>
      <guid>https://dev.to/milnuma/rethinking-authentication-a-two-card-distributed-security-model-163e</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnvnztvsm5bm6xv9jyle6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnvnztvsm5bm6xv9jyle6.jpg" alt=" " width="640" height="401"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;This model does not rely on cryptography or computational hardness.&lt;br&gt;
 It relies on physical and structural separation.&lt;/p&gt;

&lt;h2&gt;
  
  
  What do you think about the current situation where everything is concentrated in a single smartphone?
&lt;/h2&gt;

&lt;p&gt;Modern smartphones have a structure in which identity, authority, and private keys are all concentrated in one device for authentication.&lt;br&gt;
As a result, if a single smartphone is compromised or lost, everything is lost.&lt;br&gt;
Putting everything into one smartphone is not necessarily bad.&lt;br&gt;
Because it is convenient.&lt;br&gt;
However, I want you to think about security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can the loss of one smartphone really be compensated easily?&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Is the information that is lost or stolen really that insignificant?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I think this way:&lt;br&gt;
A structure where one loss leads to total loss is dangerous.&lt;br&gt;
By intentionally dividing this convenience, we may be able to maintain usability while improving structural security.&lt;br&gt;
So how can we solve this problem?&lt;/p&gt;




&lt;h2&gt;
  
  
  A Two-Card Approach
&lt;/h2&gt;

&lt;p&gt;I propose one improvement: using two cards.&lt;br&gt;
In my system, instead of relying entirely on one smartphone, authentication functions and information are distributed across two cards.&lt;br&gt;
With this design, even if one of the two cards or the smartphone is lost, secure operation can continue.&lt;br&gt;
The idea of distributing information across two cards is based on intentionally separating the roles currently concentrated in smartphones, making the system more secure and easier to use.&lt;br&gt;
Some may say that using two cards is inconvenient.&lt;br&gt;
However, with current technology, automation is possible.&lt;br&gt;
From an authentication perspective, I believe that presenting one card is still necessary. The process of "I am intentionally authenticating right now" is still important for humans.&lt;br&gt;
The other card can stay in your wallet and operate automatically using Bluetooth Low Energy (BLE) or NFC. It only responds when identity confirmation is required.&lt;br&gt;
With this automation, users only need to present one card, just like before.&lt;br&gt;
Company gates, for example, can be fully automated. However, full automation must always be implemented carefully.&lt;/p&gt;




&lt;h2&gt;
  
  
  Security Strength with Two Cards
&lt;/h2&gt;

&lt;p&gt;Although not widely known, using two cards can dramatically increase security strength.&lt;br&gt;
This is a completely different level of security compared to one card or one smartphone.&lt;br&gt;
The physical separation between the two cards creates a gap that cannot be exploited by computational attacks. Even quantum computer attacks become practically meaningless.&lt;br&gt;
This extraordinary strength comes from the fact that there is no clear attack target.&lt;br&gt;
When nothing meaningful exists in one place, there is nothing to steal.&lt;br&gt;
This level of defense is achieved only when:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Two cards are used&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Information is separated correctly&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With a single card or smartphone, this level of security is impossible.&lt;br&gt;
In other words, even inexpensive cards costing only a few hundred yen can provide strong structural security.&lt;/p&gt;




&lt;h2&gt;
  
  
  Separating Identity and Authority
&lt;/h2&gt;

&lt;p&gt;In systems like driver's licenses, we have two concepts:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity (who you are)&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Authority (what you are allowed to do)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditionally, these have been combined into one physical document.&lt;br&gt;
But what happens if we physically separate them?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;"Proof of identity" → Card1&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;"Proof of authority" → Card2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Identity alone cannot grant permission. Authority alone does not tell who the user is.&lt;br&gt;
Each becomes meaningless on its own.&lt;br&gt;
This loss of meaning is what we use for security.&lt;br&gt;
Although the separated cards may look the same as before, structurally they have changed into individually unusable forms.&lt;br&gt;
I call this transformation "information phase transition," similar to phase transitions in physics.&lt;br&gt;
When the two cards reconnect, the information transitions again from a meaningless state to an executable identity-and-authority state.&lt;br&gt;
This switching between separated and connected states becomes the foundation of security.&lt;/p&gt;




&lt;h2&gt;
  
  
  Beyond Secret Sharing and Zero Trust
&lt;/h2&gt;

&lt;p&gt;This two-card model is inspired by secret sharing. However, reconstruction is never performed.&lt;br&gt;
Reconstruction leaves traces and creates a new attack target.&lt;br&gt;
We also apply Zero Trust: trust nothing.&lt;br&gt;
The cards do not store sensitive personal data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The identity card stores only a server-issued registration number&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;The authority card stores anonymous permission data&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Even if stolen, neither reveals anything meaningful.&lt;br&gt;
The goal is to ensure that stolen information is structurally useless.&lt;br&gt;
If nothing valuable exists in one place, it cannot be stolen.&lt;/p&gt;




&lt;p&gt;How Authentication Works&lt;br&gt;
The two cards mutually authenticate each other using BLE and NFC.&lt;br&gt;
Users only present one card, but in the background:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Card1 verifies identity&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Card2 verifies authority&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Both must approve&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Neither can act alone.&lt;br&gt;
Card2 always executes authority only with Card1's approval.&lt;/p&gt;




&lt;h2&gt;
  
  
  ATM Example
&lt;/h2&gt;




&lt;p&gt;&lt;strong&gt;Traditional ATM:&lt;br&gt;
Card2 (Authority / NFC) + PIN = Identity confirmation (estimated) → ATM&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New ATM:&lt;br&gt;
Card1 (Identity / BLE) + Card2 (Authority / NFC・BLE) = ATM (Authentication + PIN)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Look carefully at this structure.&lt;br&gt;
Surprisingly, traditional ATMs have no real identity verification.&lt;br&gt;
Card2 + PIN only means "probably the right person."&lt;br&gt;
This is structurally close to 1.5-factor authentication and lacks true identity proof.&lt;br&gt;
This absence of identity verification is a critical system flaw.&lt;/p&gt;




&lt;h2&gt;
  
  
  New ATM Flow (Card Perspective)
&lt;/h2&gt;




&lt;p&gt;&lt;strong&gt;1. User presents Card2 to the ATM (NFC)&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;2. ATM requests identity proof from Card2&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;3. Card2 requests identity proof from Card1 (BLE)&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;4. Card1 provides identity proof to Card2 (BLE)&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;5. ATM receives proof from Card2 and starts service (NFC)&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;6. PIN may be requested if necessary&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The key difference is that identity verification is now included.&lt;br&gt;
Card1 is created through strict identity verification, making real identity proof possible.&lt;br&gt;
Behind the scenes, NFC + BLE + Card1 + Card2 + ATM form a multi-layer defense system.&lt;br&gt;
Users still present only one card.&lt;/p&gt;




&lt;h2&gt;
  
  
  Workplace Example (Dynamic Authority)
&lt;/h2&gt;




&lt;p&gt;&lt;strong&gt;Card1 (Identity) always ON +&lt;br&gt;
→ Entrance gate: (Card1 + Card2) automatic approval&lt;br&gt;
Card2 (Authority): NFC or BLE&lt;br&gt;
→ Arrival: Job-level permissions start (BLE)&lt;br&gt;
→ Area access: Zone-based permissions (BLE/NFC)&lt;br&gt;
→ Work start: Status change (BLE)&lt;br&gt;
→ PC use: Login permissions (NFC)&lt;br&gt;
→ Special equipment: Manager A approval (1/2)&lt;br&gt;
→ Pending Manager B approval (2/2)&lt;br&gt;
→ Active → Break: All permissions suspended (BLE)&lt;br&gt;
→ PC sleep: Permissions paused&lt;br&gt;
→ Resume work: Permissions restored&lt;br&gt;
→ Leave: All permissions ended&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;Authority is not simply ON or OFF.&lt;br&gt;
It changes dynamically based on:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Action&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;State&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Time&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Yet, no matter how complex these changes become, the overall structure remains stable.&lt;br&gt;
Even changes beyond human intuition do not break the system.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;The key is physically separating identity and authority.&lt;br&gt;
Simply splitting data evenly does not achieve this security level.&lt;br&gt;
Correct structural separation reveals hidden strength.&lt;/p&gt;

&lt;p&gt;By combining:&lt;br&gt;
&lt;strong&gt;Secret sharing&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Zero Trust&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Knowledge / Possession / Biometric factors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We can build a new security model.&lt;br&gt;
Security may feel inconvenient, but strong structures should not be oversimplified.&lt;br&gt;
Authority evolves through human intelligence.&lt;br&gt;
Its freedom is not a weakness - it is its greatest strength.&lt;/p&gt;

</description>
      <category>security</category>
      <category>authentication</category>
      <category>architecture</category>
      <category>systemdesign</category>
    </item>
  </channel>
</rss>
