On Tue, Dec 2, 2008 at 19:32, Sebastian Silva <[EMAIL PROTECTED]>wrote:
> Well initially, it was stated the problem was only to identify the > laptop, not the user, right? > (the ssh way) > That is, user=laptop is assumed so no need to even bug the user. > I'm not liking it much because it would me another kid could take your > laptop and log into all your stuff (which is true whichever way we > implement it, its the problem with user=laptop). Otherwise, how can be be sure that _any_ human _physically_present_ at the laptop authorized the request, and not a remote user? If we just have the laptop "accept all"... -lf
_______________________________________________ Sugar mailing list [email protected] http://lists.laptop.org/listinfo/sugar

