{"id":94144,"date":"2025-09-15T10:17:12","date_gmt":"2025-09-15T10:17:12","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/"},"modified":"2025-09-15T10:18:14","modified_gmt":"2025-09-15T10:18:14","slug":"mcps-biggest-security-loophole-is-identity-fragmentation","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/","title":{"rendered":"MCP\u2019s biggest security loophole is identity fragmentation"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/cdn.mos.cms.futurecdn.net\/JpXukHGqkZ8gapEzDQNqRW-1200-80.jpg\" \/><\/p>\n<div id=\"article-body\">\n<p id=\"febb47d1-5dde-481a-9a76-1ea05e8cf973\">At any time when a brand new know-how seems, it\u2019s often two steps ahead, one step backward. The backward step is often security-related. Such is the story with AI, and extra particularly, Mannequin Context Protocol (MCP). Innovation retains on working forward of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\">security<\/a>.<\/p>\n<p>On the one hand, MCP servers have been a boon to engineers. <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/best-llms\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/best-llms\">LLMs<\/a> can now converse in \u2018widespread tongue\u2019 to one another, to information sources, instruments, and even folks. They&#8217;ll hook up with information they wouldn\u2019t in any other case have entry to, past coaching information or what\u2019s public on-line.<\/p>\n<p><a id=\"elk-seasonal\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-base\"\/>\n<p id=\"febb47d1-5dde-481a-9a76-1ea05e8cf973-2\">Usually, that means data in private systems belonging to companies. That\u2019s so useful actually for better-behaved AI that MCP adoption may be far more widespread than most people realize, with over 15,000 MCP servers worldwide according to Backslash Security.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-nosnippet=\"\" class=\"clear-both pt-3 pb-4 mb-4 border-solid border-y border-neutral-300\">\n<span class=\"font-article-heading block pb-3 !text-base font-bold uppercase sm:text-sm text-[#333]\"><br \/>\nYou may like<br \/>\n<\/span><\/p>\n<\/aside>\n<div id=\"slice-container-person-Xae3YgWGsXPqYQ3ovYvEJk-OKx2ERAw4FqrfEPJ0feWZxGReo2dDxeZ\" class=\"slice-container person-wrapper person-Xae3YgWGsXPqYQ3ovYvEJk-OKx2ERAw4FqrfEPJ0feWZxGReo2dDxeZ slice-container-person\">\n<div class=\"person person--separator\">\n<div class=\"person__heading\">\n<div class=\"person__name-socials\"><span class=\"person__name\">Ev Kontsevoy<\/span><\/p>\n<nav class=\"button-social-group person__social-buttons\" aria-labelledby=\"button-social-group- person__social-buttons\">\n<p>Social Links Navigation<\/p>\n<p><a class=\"button-social   \" href=\"https:\/\/goteleport.com\/\" target=\"_blank\" aria-label=\"WEBSITE\"><span class=\"button-social__icon button-social__icon-website\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"icon-website\" viewbox=\"0 0 1000 1000\"><path d=\"M1000 500A501 501 0 0 0 503 0h-6A501 501 0 0 0 0 500c0 275 223 499 498 500h4a501 501 0 0 0 498-500zM529 936V765h133c-31 90-79 154-133 171zM337 765h134v171c-54-17-101-81-134-171zM61 539h176a899 899 0 0 0 22 167H110a439 439 0 0 1-49-166zM471 64v191H331c31-101 82-173 140-191zm199 191H529V64c58 18 109 90 140 191zm270 226H763c-1-59-7-115-18-167h155a438 438 0 0 1 40 167zm-235 0H529V314h156a857 857 0 0 1 19 167zM471 314v167H296a859 859 0 0 1 19-167h156zM237 481H60a438 438 0 0 1 41-167h154a921 921 0 0 0-18 167zm59 58h175v167H320a837 837 0 0 1-24-166zm233 167V539h175a831 831 0 0 1-24 167H529zm234-166h176a436 436 0 0 1-49 166H741a893 893 0 0 0 22-166zm104-285H731c-20-68-47-126-81-169a443 443 0 0 1 217 169zM350 86c-33 43-61 101-81 169H133A443 443 0 0 1 350 86zM148 765h127c20 59 45 110 75 150a442 442 0 0 1-202-150zm502 150c30-39 56-91 75-150h127a442 442 0 0 1-202 150z\"\/><\/svg><\/span><\/a><\/nav>\n<\/div>\n<aside class=\"person__role\"\/><\/div>\n<div class=\"person__bio\">\n<p>Co-Founder and CEO of Teleport.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p id=\"421a4b72-8360-45ec-a6f6-aa645cccf698\">However like every tech, MCP will be exploited. A whole bunch of MCP servers had been not too long ago discovered to leak delicate information and facilitate distant code execution assaults resulting from incomplete or insufficient entry controls. Pattern Micro even says menace actors might goal hardcoded credentials in MCP <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-dedicated-server-hosting-providers\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-dedicated-server-hosting-providers\">servers<\/a>. Any veteran engineer might have seen that coming from a mile away.<\/p>\n<p>\u2018How you can safe MCP\u2019 is subsequently a query many enterprises and safety groups will ask. However hackers don&#8217;t assault protocols instantly, which makes the higher query this: how do you make your underlying infrastructure, of which MCP is one half, extra resilient in opposition to widespread assault vectors like phishing?<\/p>\n<p><a id=\"elk-b9c944f5-c50b-40a7-93be-c49d753d1682\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<h2 id=\"hackers-don-t-attack-protocols-they-attack-mistakes-3\">Hackers don\u2019t attack protocols \u2013 they attack mistakes<\/h2>\n<p id=\"99e88608-d4d1-4d03-a402-9fd52b75c06d\">Almost every attack, excepting the odd zero-day exploit, begins with a mistake, like exposing a password or giving a junior employee access to privileged data. It\u2019s why phishing via credentials abuse is such a common attack vector.<\/p>\n<p>It\u2019s also why the risk of protocols being exploited to breach <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-infrastructure-management-service\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-infrastructure-management-service\">IT infrastructure<\/a> doesn\u2019t come from the protocol itself, however the identities interacting with the protocol.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-Xae3YgWGsXPqYQ3ovYvEJk\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-Xae3YgWGsXPqYQ3ovYvEJk slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Signal as much as the TechRadar Professional e-newsletter to get all the highest information, opinion, options and steerage your enterprise must succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>Any human or machine consumer reliant on static credentials or standing privileges is weak to phishing. This makes any AI or protocol (MCP) interacting with that consumer weak, too.<\/p>\n<p>That is MCP\u2019s greatest blindspot. Whereas MCP permits AI programs to request solely related context from information repositories or instruments, it doesn\u2019t cease AI from surrendering delicate information to identities which were impersonated through stolen credentials.<\/p>\n<p>That\u2019s a giant loophole when it\u2019s simpler than ever to impersonate different customers unnoticed by acquiring legitimate static credentials (e.g. passwords, API keys). MCP additionally lacks any inherent entry management options.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-nosnippet=\"\" class=\"clear-both pt-3 pb-4 mb-4 border-solid border-y border-neutral-300\">\n<span class=\"font-article-heading block pb-3 !text-base font-bold uppercase sm:text-sm text-[#333]\"><br \/>\nChances are you&#8217;ll like<br \/>\n<\/span><\/p>\n<\/aside>\n<p>So, securing MCP is de facto about ensuring solely licensed identities are interacting with AI. However realizing who or what&#8217;s a certified consumer is troublesome in right now\u2019s panorama of fragmented identities.<\/p>\n<p><a id=\"elk-f0d2fd7b-85e3-47f7-91f4-0ec0c3089ade\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<h2 id=\"welcome-to-hell-aka-identity-fragmentation-3\">Welcome to hell, aka identity fragmentation <\/h2>\n<p id=\"7c401619-d569-41b3-8a89-75f6aa937b91\">Complex modern computing environments have made it harder than ever for engineers to manage and protect infrastructure. You can see one symptom of this complexity in how enterprises handle role-based access controls: many have more roles than employees.<\/p>\n<p>Think of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-identity-management-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-identity-management-software\">identity management<\/a> right now like a giant, interconnected archipelago of islands. Every island represents elements of your computing infrastructure \u2013 cloud platforms, on-prem servers, SaaS, legacy programs, and so forth. Every has its personal customs workplace and passport programs, besides your passport (id) on one island doesn\u2019t work on the subsequent.<\/p>\n<p>Typically you want a passport, different instances a visa. Some islands have strict guards, others barely test your credentials, and others nonetheless, properly, let\u2019s simply say they misplaced your data completely.<\/p>\n<p>Should you\u2019re the customs officer, it\u2019s not possible to simply observe who\u2019s coming and going throughout islands. Some have outdated or faux passports floating round, which could take ages for customs to comprehend.<\/p>\n<p>That is laborious sufficient if the \u2018customs officer\u2019 is a safety crew, however let\u2019s say the officer\u2019s an AI mannequin. It gained\u2019t inform the CEO of an organization aside from an impostor CEO. It solely cares that \u2018the CEO\u2019 is asking for entry to monetary data.<\/p>\n<p>Once more, that\u2019s a blindspot for MCP, and so is the truth that a hacker might fake to be a <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-cloud-databases\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-cloud-databases\">database<\/a>, microservice, or AI agent. They might achieve this trivially since many machines depend on static, over-privileged credentials that may be stolen.<\/p>\n<p>MCP gained\u2019t mitigate this until paired with a safety mannequin that lets groups handle identities of people, machines, and AI extra cohesively.<\/p>\n<p><a id=\"elk-7bf939c7-1621-4c65-8c59-e50fa558b209\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<h2 id=\"making-identities-unspoofable-3\">Making identities unspoofable<\/h2>\n<p id=\"4667802a-4f5f-445f-a950-a49ee2e6d96d\">If you\u2019re deploying MCP and AI, you should combine it with a <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\">cybersecurity<\/a> method that isn\u2019t based mostly on secrets and techniques and siloed identities.<\/p>\n<p>If you wish to remove secrets and techniques, again all of your identities, together with AI, with cryptographic authentication (Trusted Platform Module, biometrics). Even MCP deployments need to get onboard with this, as a result of if an API key leaks, any attacker can impersonate anybody or something.<\/p>\n<p>So, substitute these standing secrets and techniques for brokers with robust, ephemeral authentication, mixed with just-in-time entry.<\/p>\n<p>Talking of entry, the entry controls of your chosen <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/best-large-language-models-llms-for-coding\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/best-large-language-models-llms-for-coding\">LLM<\/a> needs to be tied to the identical id system as the remainder of your organization. In any other case, there\u2019s not a lot stopping it from disclosing delicate information to the intern asking for the highest-paid workers.<\/p>\n<p>You want a single supply of reality for id and entry that applies to all identities. With out that, it turns into not possible to implement significant guardrails.<\/p>\n<p>Some <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/the-best-crm-for-startups\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/the-best-crm-for-startups\">startups<\/a> will inevitably attempt to clear up AI safety with options that handle AI identities in a vacuum, however that may make id fragmentation even worse. AI doesn\u2019t belong on an island, however in a framework the place it\u2019s conscious of broader entry insurance policies for different customers in your infrastructure.<\/p>\n<p>Nonetheless you obtain that with tooling, you need to be capable to constantly apply coverage throughout your identities from one place, whether or not it\u2019s for AI, <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-cloud-computing-services\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-cloud-computing-services\">cloud services<\/a>, servers, distant desktops, databases, Kubernetes, and so forth. These identities ought to solely ever have privileges when actively wanted, which implies no standing entry on idle.<\/p>\n<p>It will be irresponsible to say that unifying identities eradicates all cybersecurity complexity. That stated, quite a lot of the complexity disappears whenever you tidy your house. The extra advanced a system is, the extra doubtless it&#8217;s that somebody will make a mistake. And errors are, essentially, what we have to forestall.<\/p>\n<p id=\"76c87a61-9c7e-45ea-ae1f-fab2c7ccea70\"><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/it-management-tools\" target=\"_blank\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/it-management-tools\">We&#8217;ve listed the best IT management tools<\/a>.<\/p>\n<p id=\"05d7a9b0-7e3b-400b-8c6a-7c5fa3e8a6e1\"><em>This text was produced as a part of TechRadarPro&#8217;s Professional Insights channel the place we characteristic one of the best and brightest minds within the know-how trade right now. The views expressed listed here are these of the writer and will not be essentially these of TechRadarPro or Future plc. If you&#8217;re involved in contributing discover out extra right here: <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\" target=\"_blank\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\"><em>https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro<\/em><\/a><\/p>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techradar.com\/pro\/mcps-biggest-security-loophole-is-identity-fragmentation\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At any time when a brand new know-how seems, it\u2019s often two steps ahead, one step backward. The backward step is often security-related. Such is&#8230;<\/p>\n","protected":false},"author":1,"featured_media":74844,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-94144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MCP\u2019s biggest security loophole is identity fragmentation - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MCP\u2019s biggest security loophole is identity fragmentation - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-15T10:17:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-15T10:18:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/04\/JpXukHGqkZ8gapEzDQNqRW.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"MCP\u2019s biggest security loophole is identity fragmentation\",\"datePublished\":\"2025-09-15T10:17:12+00:00\",\"dateModified\":\"2025-09-15T10:18:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/\"},\"wordCount\":1202,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/JpXukHGqkZ8gapEzDQNqRW.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/\",\"name\":\"MCP\u2019s biggest security loophole is identity fragmentation - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/JpXukHGqkZ8gapEzDQNqRW.jpg\",\"datePublished\":\"2025-09-15T10:17:12+00:00\",\"dateModified\":\"2025-09-15T10:18:14+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/JpXukHGqkZ8gapEzDQNqRW.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/JpXukHGqkZ8gapEzDQNqRW.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/09\\\/15\\\/mcps-biggest-security-loophole-is-identity-fragmentation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MCP\u2019s biggest security loophole is identity fragmentation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MCP\u2019s biggest security loophole is identity fragmentation - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/","og_locale":"en_US","og_type":"article","og_title":"MCP\u2019s biggest security loophole is identity fragmentation - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2025-09-15T10:17:12+00:00","article_modified_time":"2025-09-15T10:18:14+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/04\/JpXukHGqkZ8gapEzDQNqRW.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"MCP\u2019s biggest security loophole is identity fragmentation","datePublished":"2025-09-15T10:17:12+00:00","dateModified":"2025-09-15T10:18:14+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/"},"wordCount":1202,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/04\/JpXukHGqkZ8gapEzDQNqRW.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/","url":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/","name":"MCP\u2019s biggest security loophole is identity fragmentation - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/04\/JpXukHGqkZ8gapEzDQNqRW.jpg","datePublished":"2025-09-15T10:17:12+00:00","dateModified":"2025-09-15T10:18:14+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/04\/JpXukHGqkZ8gapEzDQNqRW.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/04\/JpXukHGqkZ8gapEzDQNqRW.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/09\/15\/mcps-biggest-security-loophole-is-identity-fragmentation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"MCP\u2019s biggest security loophole is identity fragmentation"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/94144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=94144"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/94144\/revisions"}],"predecessor-version":[{"id":94145,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/94144\/revisions\/94145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/74844"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=94144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=94144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=94144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}