In youth unemployment competition

I've read about authenticating at login to a bank, and authenticating each transaction, but what I would really like my bank to do is authenticate each relationship.

This has been translated into Polish here:

When you base other works on such texts, double-check with a printed source if possible.

Here are two new active attacks we're starting to see:

However, one has to take into consideration the "work factor" of moving from passive attacks to active attacks. I think that two factor authentication is a great technology that will overall increase security by "raising the bar", forcing the attacks to get much more sophisticated (which will tend to filter out all but the most determined attackers).

Well done! Tell us all something we don't know. :-p

He also proposes that in general, attacks are moving from passive (time shifted) methods to active (real time) methods, which is what makes them especially effective against two factor authentication. Again I would have to agree.

There only remains one hundred and twenty thousand children of poor parents annually born.

9. S. McVay, 216(No. 8), 13 (1966).

I say that two-factor authentication is just about to reach the early majority, and I emphatically agree with your words of caution since careful thought during adoption will help spur real innovation, but I totally disagree with your economics. The early majority phase should remind you to change you message in order to communicate with the mass of users/adopters who are far more accepting of change and are actively shifting the culture towards an improved security posture. These are the users and system stewards who will know that two-factor is not a panacea. The sun always rises.

10. J. Fletcher, (Westminster, Philadelphia, 1966).

"Indeed, the process has been so widely commented uponthat one writer postulated a common life cycle for all of theattempts to develop regulatory policies. The life cycle islaunched by an outcry so widespread and demanding that itgenerates enough political force to bring about establishment ofa regulatory agency to insure the equitable, just, and rationaldistribution of the advantages among all holders of interest inthe commons. This phase is followed by the symbolic reassuranceof the offended as the agency goes into operation, developing aperiod of political quiescence among the great majority of thosewho hold a general but unorganized interest in the commons. Oncethis political quiescence has developed, the highly organized andspecifically interested groups who wish to make incursions intothe commons bring sufficient pressure to bear through otherpolitical processes to convert the agency to the protection andfurthering of their interests. In the last phase even staffing ofthe regulating agency is accomplished by drawing the agencyadministrators from the ranks of the regulated." [p.p.60-61]

Science #13, December 1968: Vol. 162 no. 3859 pp. 1243-1248 DOI: 10.1126/science.162.3859.1243

(Accounts are really "bankgiro" or "postgiro" numbers)

Lastly, of putting a spirit of honesty, industry, and skill into our shop-keepers, who, if a resolution could now be taken to buy only our native goods, would immediately unite to cheat and exact upon us in the price, the measure, and the goodness, nor could ever yet be brought to make one fair proposal of just dealing, though often and earnestly invited to it.Therefore I repeat, let no man talk to me of these and the like expedients, 'till he hath at least some glympse of hope, that there will ever be some hearty and sincere attempt to put them into practice.But, as to my self, having been wearied out for many years with offering vain, idle, visionary thoughts, and at length utterly despairing of success, I fortunately fell upon this proposal, which, as it is wholly new, so it hath something solid and real, of no expence and little trouble, full in our own power, and whereby we can incur no danger in disobliging England.

"The Tragedy of the Commons," Garrett Hardin,Science, 162(1968):1243-1248.

5. A. Smith, (Modern Library, New York, 1937), p. 423.

Unfortunatly if is very often difficult to judge the value of an asset, especially when it is not a physical item but information. It is worse when the asset being protected has low value in of it's self but can confer an unknown high value (such as an SMS confirming a funds transfer).

This I freely own, and 'twas indeed one principal design in offering it to the world.

7. A. N. Whitehead, (Mentor, New York, 1948), p. 17.

On the other hand, if you throw Roger's innovation/adoption curve up on the wall you might find "early adopters" on the uphill side of innovation (and return on investment) for a reason. They are trying out "new ideas in a careful way". This might put some perspective on your suggestion that two-factor chip authentication is twenty years old and it is too late to be useful...moreover, let's not confuse the RSA sales pitch (buy tokens or die) with fact.