How could SolidPass™ ensure against someone running 2FA remotely from another device (not a possibility now, but a possibility as phones improve) – backdoor into the phone, with a keystroke logger?
Mobile phone manufacturers are making progress in providing open yet secure operating systems. Since Aradiom’s 2FA solution is built on 2 factor security, key logging (for resolving the PIN) is not sufficient for identity theft. Remote control applications may work on certain phone platforms, and allow access to GUI remotely – but this is difficult to do without the legitimate user noticing, even if he/she has installed this application by accident. It should be noted that if a keylogger etc. is installed on the phone, then hardware based protection in the phone would be as vulnerable as a software solution.
Related Questions
- How could SolidPass™ ensure against someone running 2FA remotely from another device (not a possibility now, but a possibility as phones improve) – backdoor into the phone, with a keystroke logger?
- What type of CAL will a non-active directory device using Outllok Web Access need when we are currently running Windows Server Device CALs and Exchange Server Device CALs?
- Can I access a Drag Net device remotely using the Internet?