<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"></head><body ><div>That's what the last pass article is for ;-)</div><div><br></div><div><br></div><div><div style="font-size:8px;color:#575757">Sent from my Verizon Wireless 4G LTE smartphone</div></div><br><br><div>-------- Original message --------</div><div>From: Rob Funk <rfunk@funknet.net> </div><div>Date:05/24/2014 11:46 AM (GMT-05:00) </div><div>To: Central OH Linux User Group - 432xx <colug-432@colug.net> </div><div>Subject: Re: [colug-432] password survey </div><div><br></div>On Saturday, May 24, 2014 07:31:50 AM Scott McCarty wrote:<br>> When I say keys, I mean hashed keys (per my article).<br><br>OK, as far as I can tell you're talking about public/private key <br>authentication, specifically using SSH. (Just saying "keys" or even "hashed <br>keys" is really vague and could refer to a lot of schemes.)<br><br>The problem is that it doesn't solve the problem of existing protocols. SSH <br>is great, but that doesn't help with logging into Google or my bank or my <br>company's mail server, much less using my phone to do those things, nor <br>with getting random non-techies secure access to what they need.<br><br>Although it's possible to use SSH without shell access, it's a bit of a <br>hack, and far from a general solution to the authentication problem.<br><br>> As a final note, on speed and security. I am not sure what the group's<br>> opinion is on Lastpass, but I have developed a very effective personal<br>> security system based on last pass and Yubikey. This has literally<br>> changed my life ;-)<br>><br>> http://crunchtools.com/last-pass-with-yubikey<br><br>Now that is interesting.....<br><br><br>_______________________________________________<br>colug-432 mailing list<br>colug-432@colug.net<br>http://lists.colug.net/mailman/listinfo/colug-432<br></body>