Talk:End-user Computer Security/Main content/Mind-reading attacks

Broaden chapter so as to include mind-reading performed using psychological techniques (such as reading behavioural cues)?
The legacy of focusing on psychic powers, has meant that when the chapter name was broadened to "Mind-reading attacks", a vacuum came to exist in respect of other forms of mind-reading; in particular, psychological mind reading is not mentioned at all. Therefore, it might be a good idea to add some information on psychological mind reading. MarkJFernandes (discuss • contribs) 17:11, 8 May 2020 (UTC)

The distinction of 'psychic' within the broader topic of 'thought reading and control' is perhaps pointless?
All psychic phenomena (defined as mind-to-mind activities mostly without the use of technology) can be mimicked using technology. Therefore, referring specifically to psychic things perhaps narrows things unnecessarily, and degrades the material. Also, reference to 'thought reading and control' which includes primarily using technology for such, will perhaps have more credibility as it is disputed as to whether psychic phenomena really do exist.

Same also applies to "Passwords and digital keys" chapter.

"Also, the use of security tokens (such as USB security tokens) ... can overcome such psychic attacks." → "Also, the use of MFA ... can overcome such psychic attacks."?
More general, and potentially more useful.