[17781] in cryptography@c2.net mail archive
Re: the limits of crypto and authentication
daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon Jul 11 13:38:25 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: dan@geer.org
Cc: cryptography@metzdowd.com
Date: Sun, 10 Jul 2005 12:12:53 +0200
In-Reply-To: <20050709222422.74FDA1BF96C@absinthe.tinho.net> (dan@geer.org's
message of "Sat, 09 Jul 2005 18:24:22 -0400")
> Take a look at Boojum Mobile -- it is
> precisely the idea of using the cell
> phone as an out-of-band chanel for an
> in-band transaction.
>
> http://www.boojummobile.com
In the foreseeable future, this approach won't stop fraudulent
transactions because the one-time password does not depend on the
transaction content. Anything which doesn't display essential parts
of the transaction contents to the end user over a trusted channel is
doomed to failure.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com