SJS wrote:

I really do think the 1 fob + N untrusted servers + no input set of
constraints can stand.

Well, I'm not real convinced about keyfobs as I tend to prefer public keys. However, they are useful when you want to allow a *password* login.

For example, Da Gummint can surreptitiously install stuff on your computer. I would prefer that keylogging not allow instant access to every single server that allows login via my public key. I would also prefer that any key they suck up be useless to them if they don't use it *RIGHT NOW*.

The question is whether the threat model warrants the solution.

I am asking the question because these 8051's are particularly cheap.

-a


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to