[153815] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LinkedIn password database compromised

daemon@ATHENA.MIT.EDU (Phil Pishioneri)
Wed Jun 13 14:07:12 2012

Date: Wed, 13 Jun 2012 14:05:36 -0400
From: Phil Pishioneri <pgp+nanog@psu.edu>
To: "Luke S. Crawford" <lsc@prgmr.com>
In-Reply-To: <20120608232215.GB20888@luke.xen.prgmr.com>
Cc: "Aaron C. de Bruyn" <aaron@heyaaron.com>, Nanog <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 6/8/12 7:22 PM, Luke S. Crawford wrote:
> I haven't found any way that is as simple and as portable as using
> ssh that works in a web browser.

The Enigform Firefox Add-on (plus mod_openpgp on Apache httpd) seems 
similar:

http://wordpress.org/extend/plugins/wp-enigform-authentication/

> Enigform is a Firefox Add-On which uses OpenPGP to digitally sign
> outgoing HTTP requests and Securely login to remote web sites, as long
> as the remote web server is Enigform-compliant.

-Phil


home help back first fref pref prev next nref lref last post