Two-factor authentication
Two-factor authentication
Posted Sep 1, 2011 23:16 UTC (Thu) by slashdot (guest, #22014)In reply to: Two-factor authentication by ebirdie
Parent article: kernel.org compromised
Indeed, that method only foils a passive keylogger.
The only truly secure and somewhat practical method is to acquire a cheap low-end machine (preferably with hardware trusted execution path verification) which is exclusively used as a ssh terminal, and blocks all incoming traffic not related to an outgoing tcp connection.
Of course compromise of the server through the services it exposes is still possible.
