Well initially, it was stated the problem was only to identify the laptop, not the user, right? (the ssh way) That is, user=laptop is assumed so no need to even bug the user. I'm not liking it much because it would me another kid could take your laptop and log into all your stuff (which is true whichever way we implement it, its the problem with user=laptop).
Why does a simple http openid identity provider that verifies identity over face recognition+voice start to sound cooler and cooler? Sebastian 2008/12/2 Luke Faraone <[EMAIL PROTECTED]>: > On Tue, Dec 2, 2008 at 18:35, Sebastian Silva <[EMAIL PROTECTED]> > wrote: >> >> 3.- The laptop confirms the user is requesting from it. > > > This is somewhat of a problem: how can we do this without giving the user > too many "did you really mean this" prompts? > > -lf > > -- Sebastian Silva Iniciativa FuenteLibre http://blog.sebastiansilva.com/ _______________________________________________ Sugar mailing list Sugar@lists.laptop.org http://lists.laptop.org/listinfo/sugar