Hacker News new | past | comments | ask | show | jobs | submit login

In those cases people should be using hardware authentication tokens. They're both more usable and more secure.



Try convincing the US government of that. I wish you luck (I really do). Trying to educate program security people on computers is one of the banes of my existence.


Plenty of parts of the US government do know. I've seen multiple DoD networks where hardware tokens are the required form of authentication.


So have I. CACs don't work on classified systems though.



These don't work on all networks. Like classified networks.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: