> can be better secured about 3 layers down from us. > > Can be secured at the machine. > > See wifi point, see janitor point. > > You've hired the wrong interns, hired too many, or both. > > We're not here to solve corporate security/hiring policies, or the lack > thereof.
Nor should we go about implementing something with complete disgregard to the realities of how people expect to be able to secure things in the field. While the points you make are certainly valid they don't diminish the value to having actual authentication in the process. Don't just fob off the task to the 'rest of the network stack'.
