Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: cymbeline

Spoof the email address, doesn’t matter. The token gets formed using hashed information that identifies your machine (there’s various unique parts to every computer) so even within your own house a token you make on 1 machine couldn’t be transferred to another. Login to the same place that uses tokens on both they will both need and use their own token. It’s probably possible to find a way to spoof those unique things into the token, but it’s hard, again only good for an hour, then the token expires.


81 posted on 06/09/2021 12:59:41 PM PDT by discostu (Like a dog being shown a card trick )
[ Post Reply | Private Reply | To 77 | View Replies ]


To: discostu

“information that identifies your machine”

I’ve heard that each individual cpu chip has a unique identification that can be accessed and then obviously put into an outgoing message. The outgoing message could be spoofed too.

An outgoing message could be spoofed to anything desired.

Don’t know whether this is a weakness of the token scheme.

The ultimate hack would be someone standing beside the person with access ability threatening him if he doesn’t open the door.


97 posted on 06/09/2021 2:57:28 PM PDT by cymbeline
[ Post Reply | Private Reply | To 81 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson