At 07:06 PM 1/6/2004 +1100, McMeikan, Andrew wrote:
This is the real bit, how tied to identity can it be bound. How tightly do
people want to be bound. In any abuse or failing of identity whatever that
identity was authorized for is going to be the *Responsibility* of the true
identity. I freque
> The original issue involves three factor authentication
>
> * something you have
stealable perhaps
> * something you know
most people are careless with secrets
> * something you are
This is the real bit, how tied to identity can it be bound. How tightly do
people want to be bound. In any abus
At 03:10 PM 1/5/2004 +1100, McMeikan, Andrew wrote:
The only danger to such a world of peace would be those who refuse goverment
signed keys and use their own payment provider and trade amounst themselves,
they would have to be hunted down seperately.
The original issue involves three factor authe
Just some thoughts.
> -Original Message-
> From: Anne & Lynn Wheeler [mailto:[EMAIL PROTECTED]
> Sent: Sunday, 21 December 2003 5:40 AM
> To: Ernst Lippe
> Cc: Jerrold Leichter; [EMAIL PROTECTED]
> Subject: Re: Difference between TCPA-Hardware and a smart card (was:
> example: secure compu