Use key-based authentication?

On Wed, Nov 15, 2017 at 2:38 PM, James <jamex1...@gmail.com> wrote:

> On Wed, Nov 15, 2017 at 10:42 AM, Raul Miller <rauldmil...@gmail.com>
> wrote:
> > Assumption is invalid. Flaws are widely documented (e.g. fixed
> > supply). Probably wrong list, also.
> >
>
> Ok a little more on topic then. SSH.
>
> How would you secure SSH without a password, iteratively password - free?
> a blank password does not count as password-free.
>
> My motivation is turn the internet upside down.
>
> Does any current crypto mechanism come to mind?
>
> A possible example is the use of Diffie-Hellman at the network layer
> to identify hosts. I think that would be password-free.
>
>
> > Thanks,
> >
> > --
> > Raul
> >
>
> Thanks,
> James
>
>
>
> > On Wed, Nov 15, 2017 at 8:46 AM, James <jamex1...@gmail.com> wrote:
> >> While a little off topic it is security related so I hope you don't
> mind.
> >>
> >> This is the misc list, right?
> >>
> >> Assumption 1.
> >> bitcoin is a secure protocol without flaws.
> >>
> >> quote from https://github.com/bitcoinbook/bitcoinbook/blob/
> second_edition/ch01.asciidoc
> >>
> >> With these keys they can sign transactions to unlock the value and
> >> spend it by transferring it to a new owner. Keys are often stored in a
> >> digital wallet on each user’s computer or smartphone. Possession of
> >> the key that can sign a transaction is the only prerequisite to
> >> spending bitcoin, putting the control entirely in the hands of each
> >> user.
> >>
> >>
> >> Is the security of a bitcoin wallet ultimately determined by it's
> password?
> >> The way I see it If an attacker had access to my computer, the only
> >> thing protecting access to the wallet would be a password or some
> >> iteration of a password scheme, if not mine than a centralized server
> >> of trust somewhere, but eventually someone has a password that is used
> >> to, unlock a bitcoin. Is that correct reasoning or are there
> >> alternatives?
> >>
> >> Thanks,
> >> James
> >>
>
>

Reply via email to