On Tue, Dec 2, 2008 at 19:32, Sebastian Silva <[EMAIL PROTECTED]>wrote:

> Well initially, it was stated the problem was only to identify the
> laptop, not the user, right?
> (the ssh way)
> That is, user=laptop is assumed so no need to even bug the user.
> I'm not liking it much because it would me another kid could take your
> laptop and log into all your stuff (which is true whichever way we
> implement it, its the problem with user=laptop).


Otherwise, how can be be sure that _any_ human _physically_present_ at the
laptop authorized the request, and not a remote user? If we just have the
laptop "accept all"...

-lf
_______________________________________________
Sugar mailing list
[email protected]
http://lists.laptop.org/listinfo/sugar

Reply via email to