Quote Originally Posted by yaki View Post
It's not really a question of being good enough. Two-token authentication is powerful, and physical code generators are extremely hard to break without access to the original design plus the serial, or to the individual key generator. Access to a single device isn't sufficient, or you could break it by decompiling the software key generator or taking a SEM to one of the hardware key generators. It's the next best thing to impossible, and it's certainly far and above much more impractical when there is plenty of low-hanging fruit due to non-authed accounts and idiots that can't handle simple computer safety.
Isn't that what I said?