Well initially, it was stated the problem was only to identify the
laptop, not the user, right?
(the ssh way)
That is, user=laptop is assumed so no need to even bug the user.
I'm not liking it much because it would me another kid could take your
laptop and log into all your stuff (which is true whichever way we
implement it, its the problem with user=laptop).

Why does a simple http openid identity provider that verifies identity
over face recognition+voice start to sound cooler and cooler?

Sebastian

2008/12/2 Luke Faraone <[EMAIL PROTECTED]>:
> On Tue, Dec 2, 2008 at 18:35, Sebastian Silva <[EMAIL PROTECTED]>
> wrote:
>>
>> 3.- The laptop confirms the user is requesting from it.
>
>
> This is somewhat of a problem: how can we do this without giving the user
> too many "did you really mean this" prompts?
>
> -lf
>
>



-- 
Sebastian Silva
Iniciativa FuenteLibre
http://blog.sebastiansilva.com/
_______________________________________________
Sugar mailing list
Sugar@lists.laptop.org
http://lists.laptop.org/listinfo/sugar

Reply via email to