Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

He seems to be advocating that the solution is built into all levels of the stack: OS drivers, native browser support (i.e. no plugins), etc.


Using a TPM to ensure that only trusted software is accessing the fob as well. We're still a little ways off from a completely cryptographically secure software stack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: