On Tue, 26 May 2009, Bryan Kearney wrote:
But that's the point of it being one factor of two factor auth...
Even if you compromise the txt msg you still don't have the component that
the user knows. You only have the component that the user HAS.
-sv
How about a token App for the iPhone? Download a certificate with seed data
for the algorithm.. and bobs your uncle.
Requires closed-source software. - No go.
-sv
_______________________________________________
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list