Media Outlet:
Wired Publication Date:
Description:
"'The use of a honeychecker thus forces an adversary to either risk logging in with a large chance of causing the detection of the compromise of the password-has file... or else to attempt compromising the honeychecker as well.'"