Quote:
Originally Posted by ratinox
This is past to the edges of my expertise and experience so I'm not going to say yay or nay to the point (I have implemented hash-based auth but that was a very simplistic system for a POP3 client).
|
That's more expertise than most! Thanks for the interesting discussion. I hope I haven't come across as too pedantic - I've got a few decades of experience in related fields, and admit I have a tendency to get too picky (as my wife will confirm).
Quote:
But given that hardly a day goes by without another major breach being announced, it appears that doing things correctly is the exception, not the rule.
|
Nail meet head

. By far the most significant issue is weakness in implementation.
Quote:
"If". Attacks always get better, and there are no takesies-backsies.
|
Agreed.