On Wed, 29 Nov 2000, Ilya Konstantinov wrote: > On Wed, Nov 29, 2000 at 12:50:32PM +0200, Gilad Ben-Yossef wrote: > > Other methods of configuration could be very well added. How about > > attaching an GSM phone to the machine and accepting instruction only > > from SMS messages coming from a certain phone number. > > That's a rather insecure way, BTW. > Any company with direct access to the GSM exchange can create > messages with whatever source numbers they want. Nope: as long as your number is unlisted, and you require the a short key at the beginning of a message, the intruder will have to guess source number + target number + 4 digits key. If you also require a 30 seconds wait after 5 unsuccessful attempts, then the most they can do is DOS your phone...but DOSing is something pretty much unavoidable with anything that doesn't require physical access. -- Moshe Zadka <[EMAIL PROTECTED]> -- 95855124 http://advogato.org/person/moshez ================================================================= To unsubscribe, send mail to [EMAIL PROTECTED] with the word "unsubscribe" in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]