Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I know I’m just repeating what a lot of other have said, but this is sort of missing how this works. To use SSH as an example:

What you’re describing is essentially using a fingerprint instead of a private key or password for logging into a server via ssh.

The way this works is more akin to using a private key to login via SSH, but that private key is protected by a fingerprint instead of a password.

Ultimately the security comes from not sharing your private key, rather than the mechanism used to protect that key.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: