SJS wrote:
I really do think the 1 fob + N untrusted servers + no input set of constraints can stand.
Well, I'm not real convinced about keyfobs as I tend to prefer public keys. However, they are useful when you want to allow a *password* login.
For example, Da Gummint can surreptitiously install stuff on your computer. I would prefer that keylogging not allow instant access to every single server that allows login via my public key. I would also prefer that any key they suck up be useless to them if they don't use it *RIGHT NOW*.
The question is whether the threat model warrants the solution. I am asking the question because these 8051's are particularly cheap. -a -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
