top of page

Login Authentications, The Hidden Truth Behind Security Protocols

  • Nov 15, 2025
  • 4 min read

Updated: Nov 22, 2025

Every time a login to a social media, or an account that has a private profile is attempted a message is sent to another device to authenticate that login request. Soon one realizes the harsh reality is, that If another device is not readily available you have big trouble accessing that account. What's worse is if the platform that sends the authenticator request has outdated info such as an inactive phone number or email, you cant log in at all. Even when one gets around using their phone to login they most certainly will have to open another device or log in to an email address to complete the two-step authentication process. On top of all of that, now you start to get security alert text and emails letting you know that "someone is attempting to login to your account" Is that you?. This publication knows that most, if not all of you experience similar circumstances when trying to access YOUR social, financial, and other personal accounts.


To say these multi-party authenticators, as they are called, are frustrating is to say the least. For many older citizens remembering the codes and passwords makes it sometimes not worth the effort to have that online account. This also affects people who experience trouble with reading comprehensions. This causes these segments of the population to miss out on help, and services that could improve the quality of their lives. An older person having to call a relative to take them to the bank, or the phone and electric company, and even the store decreases that persons independence, and to the relative, all though they may love their older relative, This is a lot of the time, an inconvenience. This dependency also feeds predatory networks such as private ride assist vendors, and in house aid LLC`s. Caution readers! this is just the tip of authenticator requirements reach.


These "authenticator processes are sold to us as security systems , or measures that are supposedly designed to guard us against hackers, privacy intrusions, and people who want to steal our identity. The Justice Journal Blog™ has investigated this claim and has come to some alternative conclusions that everyone should note and consider as fact. Firstly, TJJB believes that if you even have something valuable to offer a criminal, and they really want it, they are going to get it if they are good enough, regardless of your safe-lock type account logins. Secondly TJJB submits to you that the very authenticators in this article commit the very violations that they advertise to protect. Yes! they monetize your online identity, the same way a hacker, or data breach criminal would. Here is how!


This publication is about to give to you all the plain, simple, and unadulterated truth about Authentication processes, so pay close attention. Are you aware that according to New Research on this topic conducted by none other than Texas A&M University research teams, and we quote: "Websites are covertly using browser fingerprinting to track people across browser sessions and sites". This makes perfect sense to this author, and lines up perfectly with the previous assumptions developed from personal experiences with authentication processes. The connotations alone are mind blowing.


What the previous paragraph is saying plainly is that when you log in on your phone and then log into your desktop to authenticate the phone login you are actually allowing the authenticator models, such as Google, Apple, and the like, broad permissions which they use to track your IP address on all of your browsers, and yes! on all devices used to authenticate that login attempt. These permissions allow them to send you advertising emails, sell your phone numbers to other parties they associate with, and allows connection permissions to all of your alternative email addresses to which they also send to retail entities all from one login attempt under the guise of {security}. This author digresses.


TJJB could go on and on with links and references that prove this point but won't. This is the statement from The Justice Journal Blog™ however. We are all being "hoodwinked, bamboozled, and led astray"! (Malcolm X). We are being controlled by the same few people in every aspect of our online lives. There about eight large Authenticator programs in use today. Giving you all of them is a bit overkill, but here are the Big Three of the group.


1. Google Authenticator: Company: (Alphabet Inc.) Controller: Sundar Pichai CEO of Google & Alphabet :(Founders: Larry Page & Sergey Brin are still holding controlling shares.)


2. Microsoft Authenticator: Company: Microsoft: Controller Satya Nadella CEO: (Founder Bill Gates is remains a major shareholder.)


3.Twilio Authenticator: Company: Twilio: Controller: Jeff Lawson Co-founder and longtime CEO Twilio New CEO: Khozema Shipchandler 


Authentication at the end of the day is nothing less than a total, and ultimate invasion of your privacy. It has gotten to the point that even tech savvy folk have to pay attention to what they click on because these privacy invasion predators now hide permissions incognito in your online spaces. So much so that what looks like a necessary click is probably a disguised use of a malicious clickjacking inclusion.


It is beyond this editorial publication to accuse anyone of wrongdoing, and TJJB would be remiss not to mention that these Authenticator App owners are invading your privacy and using your information for their company profits under complete cover of the very FCC laws that are supposedly designed to protect that very privacy that you give up when using your online platforms. It seems that all we can do as regular citizens of this country is to educate ourselves by reading publications Like The Justice Journal Blog™ and share that knowledge with those we love. Always pay attention to your privacy access permissions and be careful out there everyone.



Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page