In computer security, a lot of effort is spent on the authentication problem. Whether it
This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you

The link for this article located at ThreatPost is no longer available.