11 Nov
2005
11 Nov
'05
5:20 a.m.
* James A. Donald:
I figured that the obvious solution to all this was to deploy zero knowledge technologies, where both parties prove knowledge of the shared secret without revealing the shared secret.
Keep in mind that one party runs the required software on a computed infected with spyware and other kinds of Trojan horses. This puts the effectiveness of zero-knowledge proofs into question.