Media Coverage

Wired

May 7, 2013

"'The use of a honeychecker thus forces an adversary to either risk logging in with a large chance of causing the detection of the compromise of the password-has file... or else to attempt compromising the honeychecker as well.'"

Go to News Coverage

Other Coverage