* James A. Donald:
I figured that the obvious solution to all this was to deploy zero
knowledge technologies, where both parties prove knowledge of the
shared secret without revealing the shared secret.
Keep in mind that one party runs the required software on a computed
infected with
Charlie Kaufman wrote:
[...]
I am not aware of anyone who is publicly shipping - either
in a commercial product or as open source - an implementation
of a strong password protocol without having paid protection
money to either Lucent or Phoenix (or both).
A not totally up-to-date list of