My Profile Settings

Curious what you can do here?

Update your Profile

You may change your name and the way your name is displayed:

First Name: will be name provided on sign up, or email prefix by default
Last Name: will be “avatar” by default
Display Name: this is visible when logged in, and can be seen by others. Most others in the community will use just their first name or some creative moniker.

One Click Login Settings:

Normally Email authentication is applied when multiple users have registered on one browser or device, otherwise One Click Login is enabled.

Note- these settings are completely independent from each other.
Please take a moment to understand how they apply, and send questions to the Site Admin.

Solo Settings:
(applies when only one user has Authorized the browser/device)
Shared Settings:
(applies when 2 or more users have Authorized the same browser/device)
update submitter button

Be careful with this next setting:
You may also purge Authorization from a device or browser. This step does not remove your account, or affect usage with other devices or browsers where registration might have occurred.

This is helpful to remove your account from a shared computer, as just one example, or to decommission a Login where you will no longer use it.

After this step is complete you will be logged out of  THIS browser/device, and references to your Login status will be removed. You will no longer have either One Click Login or Email Authorization buttons appear.

Purge Authorization For THIS Device/Browser

Authentication via Email symbolThis is the symbol used when Authentication by Email will occur. When clicking a button with this symbol, this will send a new Authentication link to your email (valid for 24 hours). Clicking the link takes you back to this site at the page you requested, and you will be logged in automatically.

The Authentication Email also contains a link to copy/paste to activate other browsers.

IMPORTANT: you must visit at least one page on our site before using the Authentication Link in the browser. In case anything happens, simply click the link again or copy/paste the link again. This is our first line of defense to prevent web-bots, web-spiders, web-crawlers and bot-nets and spammers from abusing membership and stealing resources (yours & ours).

Thanks for observing this important step. Otherwise, the Authentication link contains everything required to get you logged in. It registers a browser with your Profile.

The copy/paste version of the Authentication link is helpful when registering your Profile with a browser that is not recognized as the default browser. All links in email open up in the “default browser.” So, unless you have changed that setting, your link will not open up in the browser you use. That’s fine, but it won’t recognize your Login link.

We provide the link to copy/paste and activate your Profile in the browser of your choice. This is particularly helpful for advanced users, and people who use the same computer, but choose different browsers to save their preferences and keep everything conveniently separate… go ahead and get creative.

Here’s some examples how the One Click Login settings can be used to your advantage:

  • Allow One Click Login on Shared Machines. This means you will see your Login button even when other users have been detected. This really means that someone else could just click it and log in as if they were you, so it’s the honor system and for some people this convenience is just great.
  • You can “Require Email Authentication” with shared computers or devices (phones, laptops, terminals, etc.) which means you don’t see the (One Click) Login button, and for some people this is just great.
  • You can set up Email Authentication to be required even if it’s just you on your machine. For some people this type of security is just great!
  • There are advanced “Tier 3” settings available on this site for stronger security with all the convenience. They are free, please inquire to activate these for your account.


The whole “Authenticate with Email” thing may take some getting used to, and yet without getting all techy here’s some advantages our methods create:

  1. Super Convenient – no usernames or passwords to remember or type in
  2. Register Instantly providing only your first name and email address
  3. One Click Login key sent to your Email
  4. 100% Email Privacy – No Annoying Ads or Spam
  5. Next-generation Security today
  6. Extra Convenient access for Mobile/Tablet/Touch devices


Security Today

The #1 problem facing users today is that someone could hack your personal accounts.  Our own humble servers regularly defeat 1 break-in attempt every 3 seconds, and up to 5 per second during holiday seasons (September-December). We have personally seen and responded to the increase in frequency and severity of hacking attempts since the public cloud became popular, and perhaps now you can be a little more understanding of some large corporations and even banks when they get hacked. It is a very wild world out there, and you can’t blame it on other countries- any decent hacker can pose as if they are originating in another country, but they could be next door!

Closer to home, the #1 reason most people are vulnerable to getting hacked is that they do not set strong passwords on their systems. Unfortunately, even if you are an IT security expert (or let’s say especially if you are…) you know that 100% security is impossible.

Consider that even if you do set the world’s strongest password, when a company has their servers hacked (the computers “serving” the website and internal business) that means someone has just gained access to your account regardless of how strong your password was.

Still, one must observe security measures. It’s the right thing to do, and sometimes just having “good enough” security is, well, “good enough.”

What is a “strong” password?

Most companies do not permit you to set an actually strong password. Today, given the time it can take a single computer to “crack” your password, an actually strong password looks like a minimum of 32 letters, mixing Capital letters and lower case letters, having no more than 3 repetitions of any letter, and having more letters than numbers (letters have 26 possible combinations per place vs. 10 possible numerals…) AND containing at least 10 special characters such as punctuation, where at least 2 of those are super-special characters that are not regular punctuation. Also you should change it every 3-6 months depending on your security needs at a site. Who is going to do that!?

Furthermore, real security demands that you don’t use the same password at more than 1 site. Given that the average person has at least 6 but up to 8 significant accounts online to login at, considering banks, utilities, social media, and shopping, can you imagine the inconvenience of managing actually strong passwords for all those sites. We can’t. And yet security is important…

Many people use just one password on many sites because it’s easier to remember. Now imagine that some disgruntled or dishonest employee stole your password while working for some lesser social media site and could access your bank, your facebook, your mail, and every service you use online including government sites like your Drivers License, Business Registration, etc.

The point is, even if you are an expert at security, you are going to be vulnerable in one way or another. It’s a classic case of “building a better mousetrap” vs. the “better mouse.”

Isn’t there a better way?

MiCASA™ believes that there is a better way to manage that scenario, and it’s not about how you Login. It’s about the way we handle User Authentication.

Without splitting hairs between Authentication and Login, Authentication is where the real work happens. That’s the difference between all the steps you have to go through to get a Driver’s License, or a Passport, vs. showing your License or Passport at a checkpoint to gain entry.

The idea is that some central agency handles the paperwork and initial proof of Identity. Then you have a responsibility- you have to carry your ID and present it upon request. If you think about it, it’s a lot simpler to show the credential once you have your Identity established, and all that paperwork out of the way. That’s the way it should be.

Facebook employs the world’s most well known Authentication service called OpenAuth 2.0, or OAuth2 for short. That’s the klunky thing that requests your permission to use various aspects of your personal data to join services, play games, and access new features you want. OAuth2 was starting to get very popular because you could use your initial Authentication with Facebook to instantly Login at another site, although you were additionally required to create a user account at OpenAuth. That’s one password nobody will ever remember, not even us! However, once you were Logged in successfully at XYZ site, you no longer needed to be Logged in to Facebook.

The entire experience was great in theory, but rather clumsy in practice. The chief problem we have seen with it is that it is the technology permitting large pseudo-governmental agencies such as ChoicePoint (think of it like the illuminati of credit and shopping), and federal agencies such as the NSA (United States National Security Agency) to log more than 13TB (13 Terabytes) of private citizen’s data each day . This news is according to a well trusted and highly publicized leak documented in the movie “4.” Using  Facebook for tracking the lives and movements of private citizens has done some good in the world, however, we are a bit rebellious and refuse to accept OAuth2 as the way to secure our network. To be clear, Facebook is not the only “big brother” agency or business doing things in this regard, and we are not naïve about the real state of privacy online (like free lunch- it isn’t real). We just choose to be different.

We believe that better security does not need to happen at the expense of your convenience, which means that we aren’t asking you to be the only person in the world to create and use a “strong” password.

We have thought about and solved the 6 toughest problems with Authentication and Login, and none of the solutions we use ask you to take extraordinary measures.

Our system is highly advanced, it has been independently tested over 1,000 times and we are constantly improving it to create the most secure and convenient solution today.

Every system is vulnerable- what’s ours?

The worst that seems to happen with our system (as some of you already know!) whether it’s an internet glitch or even a mistake we have made when updating our system- the worst that seems to happen is that you can’t get logged in.

Usually this gets resolved by refreshing your pages, because sometimes a browser hangs on to a page behind the scenes even though we have updated it (that’s called caching, and some browsers or user settings use “aggressive caching”, and sometimes it just seems to happen randomly, which is true). Usually this is a 24 hour condition according to our settings which can force a browser to accept new pages. However, whether it is a condition that is known, unknown, temporary, or future- your account remains secure.

We apologize sincerely and in advance for any inconvenience or frustration that our new technology causes. It is a young system less than 4 years old, yet a thoroughly tested system that is strong and intelligent the way it handles security in this post-post-modern age of computing. We believe that the current method of handling public online authentication is broken, and we would like everyone to have a better experience- more security with less hassle.

We hope our methods catch on, and by using them here, you are helping!


Let’s review:

Authentication really means getting registered at a site and establishing your Identity. Logging in means the browser checks your Identity to make sure you can pass, or Login.

We ask for only your email address to establish your identity, because your email address is unique globally. Also note that every site on the planet that uses passwords allows you to reset your password via email. That’s good enough for everyone including banks at the upper echelon of their security when it comes to online access, but that’s the lowest level of security our system employs. We begin where others leave off…

With MiCASA™ the benefits are that you don’t manage a password at all to access our system, the password protecting your account at Learning Tantra is super-duper tough, and we combine the step of Authentication and Login so that all you do is click a specially created link. That’s called One Click Login, and it works for you in 4 ways:

  1. You click one link to Authenticate (confirm your Identity) the first time you register for a site
  2. You click one link to extend that Authentication to other Computers or Devices
  3. You click one button when you return to a site (in case you have logged out…) to re-enter the site with all your membership privileges.
  4. You click one button to Login at a different site when it is related to this one, also called “SSO” or single-sign-on.

You should be “remembered” after you Authenticate with any Browser such as Google Chrome, Firefox, Safari, or Internet Explorer to name just a few, and that means you can Login or Logout with one click of a button without requesting another Login Key (the authentication link sent to your email).

Advanced Features:

There are advanced features that help you use One Click Login in case you use “Private Browsing” software with today’s standard browsers, and the Tor browser. However, if you are employing such security methods you will find our system far easier to manage to remain logged in. As we said, it’s a very intelligent system.

Remember, instead of taking a username and password to a new Browser (when you use a different computer, laptop, tablet, or mobile device…) you perform the original “Authentication” by submitting your email address in one of our forms- we send you a special link to Email- and then with one click you get Logged in.

Our system manages a super-tough password all on its own, and we have secret features that make it really tough for hackers to compromise your account even if they do gain access to your webmail.

Using MiCASA and this site, you never have to manage the super tough password assigned to you, or your username.

You get to choose your own screen-name and that’s what everyone will see when you’re online. So it can be a simple name that a lot of other people have, or it can be totally unique to you.

It would be far easier to try to hack your email account and use it to login as you… and the statistics are that 1 in 10 webmail accounts will get hacked, usually for the purposes of sending spam mail, but sometimes for worse purposes than that. To resolve that case please secure your email account, whether that is online mail or your own private login: please take care to use the strongest password you can stand to use.

In case you do get hacked, there are ways to clear Login regardless of where it has occurred, or who has accessed it; and there are special contingencies to restore private access to your account even if someone else does control your email account (and yes it does work by magic- special tech magic). However, we do recommend regaining positive control of your email account before anything else.

Finally, here are some factoids that speak to the advanced features of our system. All you really need to know is that we use incredibly strong security through-and-through while you have a really convenient system to get Login and security with your membership.

Thanks for participating in our revolutionary Login and Authentication system!

Observe these advanced features, and developer features:

  • You aren’t exposed to outside agencies tracking you on our site
  • You can share your account on the same computer
  • You can protect your account even when sharing the same computer
  • You can automatically Login (“remember me”) even with a very long time before you return
  • You can specially register your Computer or Device permanently on our site (no Logins ever!)
  • You avoid ½ of the Login tedium on Mobile because we don’t require passwords
  • Our system is just more secure and more convenient that OAuth, OpenID, and Persona. It’s awesome!
  • 10ms (average) asynchronous API calls
  • Up to 400 day “remember me” period after initial authentication (site setting)
  • Anti-hack and stop-loss measures built-in, including “My mail has been hacked” (Tier-3) contingencies
  • Optional n-tier security settings provide military grade crypto-secure access (site setting)
  • SSO supported for discrete servers/hosts (read: separate datacenters)
  • Networking on-the-fly with de-centralized granular permissions
  • SAAS coming in 2017 for MiCASA Managed Service Layer on YOUR site

As a member of Learning Tantra you will soon be able to keep a secure online Journal to keep track of your progress through our courses, Group Forum and Accountability groups with specific control over how much (if any) can be shared, live broadcast events, and many more exciting features…