Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

1
  • What services are you trying to authenticate with? The obvious advice here is to not authenticate with any service that hold substantial value for you. It also seems like in the threat model there signifficant latency between the time your information is recorded and the time at which it might be used. In that case simply make your password update cycle slightly shorter than the minimum time between data recording and data use. i.e. If your data is recorded on Monday and the earliest an attacker could use the information is Thursday, then update your passwords on Wednesday.
    – this.josh
    Commented Aug 15, 2011 at 18:48