tag:blogger.com,1999:blog-18157064.post4986269958762078626..comments2024-03-18T02:14:57.204-07:00Comments on Google Operating System: Google Account Authentication Using Your PhoneAlex Chituhttp://www.blogger.com/profile/02618542750965508582noreply@blogger.comBlogger15125tag:blogger.com,1999:blog-18157064.post-56492199029573460402012-04-19T02:02:33.762-07:002012-04-19T02:02:33.762-07:00Hi Dirk,
I have a high tech start up we are inves...Hi Dirk,<br /><br />I have a high tech start up we are investigating one touch log in using mobile phone number as authentication....are you pursuing this technology? and if so, is it worth a conversation?<br /><br />kind regards<br /><br />nickAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-9559473535876959292012-04-01T21:19:40.109-07:002012-04-01T21:19:40.109-07:00Wish it still worked.....Wish it still worked.....Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-70027581620511420032012-01-18T00:55:53.320-08:002012-01-18T00:55:53.320-08:00What about security?What about security?Парапетиhttp://inoxeng.comnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-55650763191454260732012-01-17T09:45:23.367-08:002012-01-17T09:45:23.367-08:00Maybe I will try this service to get more secure i...Maybe I will try this service to get more secure in using google services such as gmail.Dwijayasbloghttp://dwijayasblog.blogspot.com/noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-10777607523378103832012-01-17T06:33:33.946-08:002012-01-17T06:33:33.946-08:00Because the phone doesn't support Flash.
Becau...Because the phone doesn't support Flash.<br />Because the user wants to download data to the computer.<br />Because the user wants to diagnose or test the computer in some way.<br />Because the computer is on a network that the phone can not access which is either faster or has access to data that the user wants to use in conjunction with his/her Google account.<br />Because the computer has software, data, peripherals, features or capabilities that the phone can not access (Keyboard, mouse, larger screen, fingerprint identification...).<br />Because the phone's battery is near empty, or needs to be reserved.<br />Because the user wants to use the computer and doesn't have a phone, but uses a friend's phone (which he trusts) to access a computer (which he doesn't trust).Matan Ariehttps://www.blogger.com/profile/00377474969715401359noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-73105435264431538302012-01-17T06:26:05.869-08:002012-01-17T06:26:05.869-08:00Any of the following scenarios could constitute a ...Any of the following scenarios could constitute a computer you do not trust:<br />A student using a campus computer.<br />Using a coworker's computer.<br />Testing a computer you wish to purchase at a store.<br />Testing a computer at a convention.<br />A technician, diagnosing a customer's computer in a lab.<br />A computer in a cyber cafe or ather public access location.Matan Ariehttps://www.blogger.com/profile/00377474969715401359noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-40457699007387343582012-01-17T02:44:06.936-08:002012-01-17T02:44:06.936-08:00Because he doesn't have a full-sized keyboard ...Because he doesn't have a full-sized keyboard or a 50" display on his phone?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-84854760652466413312012-01-17T02:37:43.568-08:002012-01-17T02:37:43.568-08:00Why would anyone use public PC if he already has I...Why would anyone use public PC if he already has Internet on the phone :)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-4352917407022679682012-01-17T00:55:27.533-08:002012-01-17T00:55:27.533-08:00Yup, it has been taken down.Yup, it has been taken down.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-12884688183486110692012-01-17T00:46:22.615-08:002012-01-17T00:46:22.615-08:00https://accounts.google.com/sesame & http://go...https://accounts.google.com/sesame & http://goto.google.com/login<br /><br />gets:<br /><br />Hi there - thanks for your interest in our phone-based login experiment.<br />While we have concluded this particular experiment, we constantly experiment with new and more secure authentication mechanisms.<br /><br />Stay tuned for something even better!<br /><br />Dirk Balfanz, Google Security Team.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-76695857205889973542012-01-16T20:06:14.624-08:002012-01-16T20:06:14.624-08:00This is not for kids. See my reply above.This is not for kids. See my reply above.Ashutosh Raghuwanshihttps://www.blogger.com/profile/08208837821977587436noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-49251380163765785412012-01-16T20:05:25.603-08:002012-01-16T20:05:25.603-08:00If you just need to send a mail which is not secre...If you just need to send a mail which is not secret, you may send it from a cyber cafe but in order to do so you must enter your password which is definitely secret.Ashutosh Raghuwanshihttps://www.blogger.com/profile/08208837821977587436noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-31829731529801378382012-01-16T19:27:45.140-08:002012-01-16T19:27:45.140-08:00Obviously, Google is of the mindset that the kids ...Obviously, Google is of the mindset that the kids will be doing it anyway, might as well make it as safe as possible...Jeremyhttps://www.blogger.com/profile/18116179600059115654noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-48304024339458696842012-01-16T19:21:13.198-08:002012-01-16T19:21:13.198-08:00Why would you be doing anything on a computer you ...Why would you be doing anything on a computer you don't trust?Roger H Charleshttps://www.blogger.com/profile/13562823128644925388noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-75382504861898361062012-01-16T16:40:01.417-08:002012-01-16T16:40:01.417-08:00http://goto.google.com/login also works.http://goto.google.com/login also works.davidnoreply@blogger.com