Computers have a hard time verifying human identity, or even identifying machines that are posing as humans. This poses a great challenge to engineers who want to create secure and usable computer systems. Good security can already be difficult in theory, but in practice user behavior makes it even trickier.
By