Anybody know anything about two factor authentication?

What if I gave a token to the neighbor kid and told him to take it to
my Aunt Millie across town.  An hour later Aunt Millie calls me on our
ultra-secure encrypted point to point telephone line to say that she
has it.  So I open my control panel and synchronize the server with
her token, and then set her a PIN.

Was having the token out of my control for that hour a security consideration?

-todd


-- 
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to