This document discusses passwords and authentication. It notes that most passwords are very weak and common, being among the top 1000 most common passwords. It then discusses problems with password reuse, phishing, and keylogging. Alternative authentication methods are proposed like passwordless authentication, two-factor authentication, and OAuth standards for authorization. The importance of security but also user experience is emphasized. Questions are welcomed from the audience.