On Di Mai 26 2009, Seth Vidal wrote:

> If someone steals my phone - then they can get the txt msg but they can't
> get my password that only I know.
>
> If someone gets my password they have to steal my phone or hijack my txt
> msgs to get the other bit.
>
>
> So, how is this better/worse than any other 2factor auth?

If someone has only temporary access to your phone, it is a lot easier to 
tamper it and give it back to you, without you noticing it. Hardware tokens 
are normally more tamper proof and are not easy to be cloned. Therefore the 
attacker has to be in posession of the token at the time of the login. Thefore 
you can be sure that nobody else is logging in as you as long as you have the 
tokens in your hand.

Regards
Till

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Fedora-infrastructure-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list

Reply via email to