How could SolidPass™ ensure against someone running 2FA remotely from another device (not a possibility now, but a possibility as phones improve) – backdoor into the phone, with a keystroke logger?

Mobile phone manufacturers are making progress in providing open yet secure operating systems. Since Aradiom’s 2FA solution is built on 2 factor security, key logging (for resolving the PIN) is not sufficient for identity theft. Remote control applications may work on certain phone platforms, and allow access to GUI remotely – but this is difficult to do without the legitimate user noticing, even if he/she has installed this application by accident.

It should be noted that if a keylogger etc. is installed on the phone, then hardware based protection in the phone would be as vulnerable as a software solution. More.

I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.

Related Questions