lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <411BFE94.8010105@securescience.net>
Date: Thu, 12 Aug 2004 16:34:44 -0700
From: Lance James <lancej@...urescience.net>
To: joe@...ompiled.org
Cc: bugtraq@...urityfocus.com
Subject: Re: SSC Advisory TSA-051 (T-mobile wireless and Verizon Northwest)


Joe Eversole wrote:
> On Wed, 11 Aug 2004 14:10:18 -0700, Secure Science Corporation
> Advisory Notice <bugtraq@...urescience.net> wrote:
> 
> 
>>Solution:
>>- ---------
>>Add 2-factor authentication (passcode requirement) by default and cease
>>implicit trust of Caller-ID information.
> 
> 
> T-Mobile's messaging system (in Indianapolis, at least. I do not know
> if they have migrated to a single VM system) has a setting the user
> can specify to require passcode when calling from mobile phone.

Hence, by default! It is not on by default.


> 
> --je
> 
> 


-- 
Best Regards,
Lance James
Secure Science Corporation
www.securescience.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ