1.1 KiB
1.1 KiB
Agenda
- Discuss Table-top scenario format: I’ve never done a table-top discussion. I’d like to go over the format.
- Discuss specific scenarios: If you have some specific scenarios you’ve been thinking about, I’d like to go over them. This will give Brooks and I some time to think about solutions and bring them for a deeper discussion next week.
The
- identify attack surface
Nist 800-63b
specific scenarios
- dispersion attack
- nKode observations (from shoulder surfing to screen recording)
- key replay attack
- nKode only authentication; what happens nKode is used email?; how do you recover from a lost nkode?
- can create icons that look the same if they've been compress? Can you mess with advisories ability to record a screen, compress it and send it over the wire
- Can we design non space filling shape? what if the shapes float around in the key? what if they're animated
Make a powerpoint with the gate analogy how will we engage them to think about architectural design? can we relax MFA requirements? (nkode make credential stuffing impossible)