[17758] in cryptography@c2.net mail archive
Re: the limits of crypto and authentication
daemon@ATHENA.MIT.EDU (James A. Donald)
Sat Jul 9 23:43:18 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
Date: Sat, 09 Jul 2005 18:56:22 -0700
In-reply-to: <200507091956.40341.iang@systemics.com>
--
Ian Grigg <iang@systemics.com>
> In the payments world we've known how to solve all
> this for some time, since the early 90s to my
> knowledge. The only question really is, have you got a
> business model that will pay for it, because any form
> of token is very expensive, and the form of token that
> is needed - a trusted device to put the application,
> display, keypad and net connection on - is even more
> expensive than the stop-gap two-factor authentication
> units commonly sold.
Such a device sounds like a cell phone.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
5nMEZ3YWGEUKZWzEprv/E7vI+8j9jzBNX8GWiJiO
4nb4BSDrVGLfq42fHktPRSAfFO3N0uGBnezGRNWrS
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com