James Longstreet wrote:

On Mar 26, 2006, at 12:12 PM, Anders B Jansson wrote:

And even then they fail the actual user has a gun at his temple.

Frankly, this is true of just about any authentication scheme.

Exactly, so how far should you drive your requirements for an authentication 
scheme?

Pushing requirements to far will lead to weaker security and higher cost 
without any gain.

--
// hdw

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to