Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    text
    copied!<p>This is a <a href="http://chargen.matasano.com/chargen/2007/9/7/enough-with-the-rainbow-tables-what-you-need-to-know-about-s.html" rel="nofollow">classic</a> <a href="http://chargen.matasano.com/chargen/2007/9/25/adam-bozanich-did-not-uncover-an-nsa-ipsec-conspiracy-diffie.html" rel="nofollow">authentication</a> issue, except that here, Eve can wear Bob's skin like a suit. Is that stretching the metaphor? <em>I'm not sure.</em> </p> <p>The short answer is that there is no true answer, because what you want is something that basically violates information theory, in that anything transmittable is copyable and thus anything accessible can be viewed as no-longer-unique. Even if you had a magic box, they could just yank out the magic box with some serious JVM hacking. </p> <p>The long answer is that there are a few solutions that are almost pretty okay, by making it really quite darn hard. I suggest you read the article linked, acquaint yourself with the ideas behind SRP, the vulnerabilities the spec entails, and try to figure out how to get the right to use and implement it. The problem is still there though. It's that you want a system that ensures Bob can never become a flesh-chariot, or fall to the dark side.</p> <p>Fundamentally, you're breaking the <a href="http://technet.microsoft.com/en-us/library/cc722487.aspx" rel="nofollow"> tenth law</a>. I agree with Kork, there's no solution that really does what you want, because you're trying to solve a social problem with a technical feat, one that is quite nearly provably impossible.</p>
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload