On 19 January 2013 07:45, James A. Donald <jam...@echeque.com> wrote:
> On 2013-01-19 2:14 AM, ianG wrote:
>>
>> Also, the confounded users tend to lose their phones or have them stolen.
>> And then they demand their 'identities' back, as if nothing has happened.
>> So the keys need to be agile, in some sense.  Which pushes us away from the
>> phone, to cloud, or a variant, and then we're back to the same old remote
>> password problem.
>
>
> Keys typically and commonly in the cloud, access them by SRP.

Time to mention Nigori again, which is essentially this, minus the FUD
around SRP.
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to