From: owner-ammf-digest@smoe.org (alt.music.moxy-fruvous digest) To: ammf-digest@smoe.org Subject: alt.music.moxy-fruvous digest V14 #4152 Reply-To: ammf@fruvous.com Sender: owner-ammf-digest@smoe.org Errors-To: owner-ammf-digest@smoe.org Precedence: bulk alt.music.moxy-fruvous digest Wednesday, May 13 2020 Volume 14 : Number 4152 Today's Subjects: ----------------- Stay safe during these worrying times with these easy steps... ["Immune S] ---------------------------------------------------------------------- Date: Wed, 13 May 2020 09:11:22 -0400 From: "Immune System" Subject: Stay safe during these worrying times with these easy steps... Stay safe during these worrying times with these easy steps... http://workserve.guru/ZweEUDcC7AkKjHkBuyFa1P1w13ds7bIVLNhNX54ivGTt0meU http://workserve.guru/Bi4aMkkW4FSuIHiM1OqYxuedK4JT12o5nFe9SJGbfzOYypU Historically, fingerprints have been used as the most authoritative method of authentication, but court cases in the US and elsewhere have raised fundamental doubts about fingerprint reliability.[citation needed] Outside of the legal system as well, fingerprints have been shown to be easily spoofable, with British Telecom's top computer-security official noting that "few" fingerprint readers have not already been tricked by one spoof or another. Hybrid or two-tiered authentication methods offer a compelling[according to whom?] solution, such as private keys encrypted by fingerprint inside of a USB device. In a computer data context, cryptographic methods have been developed (see digital signature and challenge-response authentication) which are currently not spoofable if and only if the originator's key has not been compromised. That the originator (or anyone other than an attacker) knows (or doesn't know) about a compromise is irrelevant. It is not known whether these cryptographically based authentication methods are provably secure, since unanticipated mathematical developments may make them vulnerable to attack in future. If that were to occur, it may call into question much of the authentication in the past. In particular, a digitally signed contract may be questioned when a new attack on the cryptography underlying the signature is discovered.[citation needed] Authorization ------------------------------ End of alt.music.moxy-fruvous digest V14 #4152 **********************************************