Use key-based authentication? On Wed, Nov 15, 2017 at 2:38 PM, James <jamex1...@gmail.com> wrote:
> On Wed, Nov 15, 2017 at 10:42 AM, Raul Miller <rauldmil...@gmail.com> > wrote: > > Assumption is invalid. Flaws are widely documented (e.g. fixed > > supply). Probably wrong list, also. > > > > Ok a little more on topic then. SSH. > > How would you secure SSH without a password, iteratively password - free? > a blank password does not count as password-free. > > My motivation is turn the internet upside down. > > Does any current crypto mechanism come to mind? > > A possible example is the use of Diffie-Hellman at the network layer > to identify hosts. I think that would be password-free. > > > > Thanks, > > > > -- > > Raul > > > > Thanks, > James > > > > > On Wed, Nov 15, 2017 at 8:46 AM, James <jamex1...@gmail.com> wrote: > >> While a little off topic it is security related so I hope you don't > mind. > >> > >> This is the misc list, right? > >> > >> Assumption 1. > >> bitcoin is a secure protocol without flaws. > >> > >> quote from https://github.com/bitcoinbook/bitcoinbook/blob/ > second_edition/ch01.asciidoc > >> > >> With these keys they can sign transactions to unlock the value and > >> spend it by transferring it to a new owner. Keys are often stored in a > >> digital wallet on each user’s computer or smartphone. Possession of > >> the key that can sign a transaction is the only prerequisite to > >> spending bitcoin, putting the control entirely in the hands of each > >> user. > >> > >> > >> Is the security of a bitcoin wallet ultimately determined by it's > password? > >> The way I see it If an attacker had access to my computer, the only > >> thing protecting access to the wallet would be a password or some > >> iteration of a password scheme, if not mine than a centralized server > >> of trust somewhere, but eventually someone has a password that is used > >> to, unlock a bitcoin. Is that correct reasoning or are there > >> alternatives? > >> > >> Thanks, > >> James > >> > >