Skip to content ↓

In the Media

Media Outlet:
Wired
Publication Date:
Description:
"'The use of a honeychecker thus forces an adversary to either risk logging in with a large chance of causing the detection of the compromise of the password-has file... or else to attempt compromising the honeychecker as well.'"