On 2013-01-19 2:14 AM, ianG wrote:
Also, the confounded users tend to lose their phones or have them stolen. And then they demand their 'identities' back, as if nothing has happened. So the keys need to be agile, in some sense. Which pushes us away from the phone, to cloud, or a variant, and then we're back to the same old remote password problem.

Keys typically and commonly in the cloud, access them by SRP.




_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to