Editing 1809: xkcd Phone 5

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 122: Line 122:
 
; 28-factor authentication
 
; 28-factor authentication
  
: An {{w|Authentication#Factors and identity|authentication factor}} is a way of proving one's identity. There are [https://www.cse.msu.edu/~rossarun/BiometricsTextBook/Papers/Introduction/OGormanPasswdTokenBiometrics_IEEE03.pdf 3 generally recognized forms]: something you know, something you have, and something you are. It can be a password, a fingerprint, a physical key, etc.... Secure applications may include two or more factors; a common example is the "PIN and chip" system used with credit cards, where you need both the card and secret code to authorize a transaction. Many online services now provide two-factor authentication to protect against password-based attacks. 28-factor authentication would likely be very secure in theory but also so impractical that it would be unusable. The user will need to prove their identity 28 different ways which would be so time consuming that would outweigh the convenience of a smart phone. A 2-factor smoke detector was soon after mentioned in one of the tips in [[1820: Security Advice]].
+
: An {{w|Authentication#Factors and identity|authentication factor}} is a way of proving one's identity. There are [http://www.nikacp.com/images/10.1.1.200.3888.pdf 3 generally recognized forms]: something you know, something you have, and something you are. It can be a password, a fingerprint, a physical key, etc.... Secure applications may include two or more factors; a common example is the "PIN and chip" system used with credit cards, where you need both the card and secret code to authorize a transaction. Many online services now provide two-factor authentication to protect against password-based attacks. 28-factor authentication would likely be very secure in theory but also so impractical that it would be unusable. The user will need to prove their identity 28 different ways which would be so time consuming that would outweigh the convenience of a smart phone. A 2-factor smoke detector was soon after mentioned in one of the tips in [[1820: Security Advice]].
  
 
The title text that says that the phone will be returned to you by the toll operators is a reference to E-ZPass partnership feature; see explanation in the table regarding that feature.
 
The title text that says that the phone will be returned to you by the toll operators is a reference to E-ZPass partnership feature; see explanation in the table regarding that feature.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)