Skip to Content
1-08-2010 @ 1:13AM
They don't even have to do that; they've already proven they can make these as stand alone software applications (for iPod/iPhone and other mobile phones); so just come up with an authenticator that runs on the local desktop.It's not as secure, but as long as the seed number for the authenticator is something random combined with the date stamp at activation, it should be practically impossible to hack--no significant percentage of account hacks involves actually having physical access to the machine, they just get people to give away information without realizing it. Then you can keep selling the stand alone physical authenticators as a "more secure" option--less likely to ever be hackable, no need to go through authenticator problems if your hard disk crashes, able to be used with multiple computers, etc.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.