Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Bobalu
Hey Bobalu. Some interesting analysis. My bank sent me one of these key-chain style RSA SecurID devices to carry with me on international travels where if you don't have a roaming-capable US mobile phone, the bank can still verify my identity.

The bank gives you one minute to return the 6 digit code, and the code on the device changes every 60 seconds.

My question for you is: how secure is one of these devices?

Thanks.

12 posted on 05/06/2024 3:51:15 AM PDT by poconopundit (Kayleigh the Shillelagh, I'm disappointed in you....)
[ Post Reply | Private Reply | To 10 | View Replies ]


To: poconopundit

If properly implemented it could be good... but that’s the thing, closed source crypto is not to be trusted. If they publish the source and details of the device so it can be verified then great... otherwise beware.

NEVER trust closed-source encryption code or hardware!

The small, stand-alone crypto device is a move in the right direction though.

Only a crypto device that is in your control at all times can be trusted... thus it needs to be quite small. Such a device that could also serve as a secure firewall/router via blue tooth would revolutionize the internet.

A personal crypto device should do the following.
-Utilize both public key and XOR encryption.
-Create a reputation based local/wide area crypto currency system that does NOT depend upon the internet.
-Enable a local network using something like Meshtastic.
-Enable a long distance network using NVIS rf propagation in the HF band (roughly 3-12mhz)
-The device must have chipsets for ALL available GPS systems.. this is to enable the NVIS networking which needs the precise time/location for weak signal work.
-Enable a system which uses the URL address to create a ban-proof backup to social networks. i.e. if www.twitter.com/whoever is banned from Twitter your personal device will detect that from the data received from Twitter and automatically route your request to another site where “whoever” could still have free speech. i.e. www.Truthsocial/whoever could be where your request might be sent... there is NO way to cut off a user from accessing “whoever” even if banned.. this is very simple and easily implemented.. it’s a mystery why it has not been!

The NVIS long-range comms is SLOW by modern standards.. best for text/compressed images/compressed audio. The system works by cooperating with other users devices in real-time to assist in RF transmissions... this works despite the problem of signal cancellation of multiple rf sources but only at low data rates.


13 posted on 05/06/2024 4:25:30 AM PDT by Bobalu (I can’t even feign surprise anymore.)
[ Post Reply | Private Reply | To 12 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson