The "email is authentication" pattern
Email as the de facto identity and “root account”
- Many note that because almost all services support “forgot password via email,” email already is the real authentication and account-recovery root, no matter how fancy the primary login looks.
- Email is seen as the “lowest common denominator”: everyone has it, and major providers’ security is usually better than that of random sites.
- Concern: if you lose email access (provider lockout, domain lapses, provider shutdown), you can lose access to many accounts at once.
Magic links / email OTP as primary login
- A growing number of sites skip passwords entirely: enter email → receive code or link → you’re in.
- Supporters:
- Great for infrequent/low-value accounts and B2B tools where users log in rarely.
- Avoids password storage, password rules, and password managers most people won’t use.
- For some funnels (ecommerce, “guest login”), this improves conversion.
- Critics:
- Very annoying for users with password managers; slower than autofill + TOTP.
- Depends on timely email delivery; greylisting, spam filters, corporate scanners, and link prefetchers often break or delay the flow.
- Painful when email is on a different device than the browser/app.
Phones, SMS, and other authentication options
- Broad agreement that phone numbers are weaker than email (SIM swap, carrier social engineering, SS7 issues).
- SMS 2FA is seen as convenient but fragile; some prefer TOTP/authenticator apps or passkeys.
- Some argue that “2FA” is hollow if password reset via email bypasses it.
Government / bank / postal digital IDs
- Several countries’ schemes (national e-ID, BankID, login.gov-like systems, postal-service IDs) are discussed.
- Pros: strong recovery channel, in-person recourse, possibly pseudonymous per-site tokens.
- Cons: privacy, central tracking, exclusion of unbanked/non-citizens, complex onboarding, and heavy regulation; concerns about putting even more power in governments and banks.
Human factors, recovery, and crypto analogies
- Strong theme: any auth scheme must handle loss and recovery for normal humans; “lose key, lose everything” (as in self-custodied crypto) is seen as incompatible with mass adoption.
- Secret-sharing / “panel of peers” recovery is debated: theoretically good, but UX, phishing, and real-world coercion risks are highlighted.
- Many see backup discipline and key management as beyond what most people will reliably do without very opinionated, guided UX.