Hacker News new | past | comments | ask | show | jobs | submit login

competent attackers have been able to sight-read & reproduce keys for literal millennia. What needs to be evaluated is user behavior regarding keys.



I think you'll have better luck adapting lock technology to user behavior than changing every user's behavior.

Good password selection thinking should be commonsense by now to people who post here, but it seems like there's still a lot of work to be done educating the general (less geeky) public.


> What needs to be evaluated is user behavior regarding keys.

Or just smarter keys like cars have these days (which have pretty much stopped non flat-bed car theft).


I know practically nothing about the smarter keys that cars have these days. Could you please elaborate? I'm intrigued.


I don't have any inside knowledge, but presumably the keys and car exchange messages and do some crypto signing. For example, the car makes up and sends a random string, the key signs it and sends it back.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: