On Mon, 8 Dec 2003, Colin Watson wrote:

> What you'd actually want is hardware that stores the keys and does the
> signing and decryption for you, but refuses to expose the private key
> material itself to the host. Then, while a cracker could sniff your
> passphrase, the key itself would still be safe after the machine had
> been re-secured. You can go further by requiring physical presentation
> of smartcards or similar in order to use the key, which is less
> convenient but makes a passphrase more or less useless on its own.

you can also use a [warm blooded] fingerprint scanner ...
since "smartcards can be lost" .. 
        - but if you lose your finger or you lose your fingerprint
        on a glass with fingerprint stealing glue, you're in deep kaka
        anyway

        - the scanners isa bout $200 or so  ( sony/nec has um )
        and somebody has the fingerprint scanner built into the keyboard

        - we did it also with twane 8.5"x11" scanners a few years back ...

have fun
alvin

> (Disclaimer: I work for such a company, although you'd probably have to
> do a bit of work at the moment to integrate our hardware smoothly with
> gpg and ssh.)
> 
> -- 
> Colin Watson                                  [EMAIL PROTECTED]
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to