A look at password security, Part III: More secure login protocols
This is mostly a story of failure, though with a sort of hopeful note at the end. The ironic thing here is that we’ve known for decades how to build authentication technologies which are much more secure than the kind of passwords we use on the Web. In part II, we looked at the problem of Web authentication and covered the twin problems of phishing and password database compromise. In this system, I’ll be covering some of …
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.