Putting this together with Kelly's hottub-access idea from last night, we could make authority chains...<div><br></div><div>You have access to the gate via your phone number; you can give others access to the gate by registering their phone number, but it's tied to yours; if they give others access, it's two levels down that particular access branch.</div>
<div><br></div><div>This way, if we revoke my access, my little branch of the tree of trust gets cut off, and people who gained access via me have to get re-authorized.</div><div><br></div><div>Ideally, I'd be able to get on several upstream people's access lists, that way if one of them gets booted I still have a way in...</div>
<div><br></div><div>--S<br><br><div class="gmail_quote">On Wed, Feb 8, 2012 at 11:32 AM, Jonathan Lassoff <span dir="ltr"><<a href="mailto:jof@thejof.com">jof@thejof.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">On Wed, Feb 8, 2012 at 11:26 AM, Shannon Lee <<a href="mailto:shannon@scatter.com">shannon@scatter.com</a>> wrote:<br>
> I think the original idea was that you'd have a list of caller IDs whose<br>
> phone would unlock the door.<br>
<br>
</div>Oh, right duh. Seems decent.<br>
<br>
Another fun idea I've heard bandied about: use device descriptor<br>
information of arbitrary USB devices. Most have some vendor IDs and<br>
serial numbers that makes them mostly unique. Have a port downstairs<br>
that you can plug a USB stick into.<br>
<br>
I like the idea of methods of gaining entry that take a bit of skill.<br>
This raises the bar for entry and acts as a bit of a filter against<br>
moochers, and filters for hacker types (whom I'd love to hang out<br>
with, but seem way too rare at 2169 as of late).<br>
<br>
Cheers,<br>
jof<br>
</blockquote></div><br><br clear="all"><div><br></div>-- <br>Shannon Lee<br>(503) 539-3700<br><br>"Any sufficiently analyzed magic is indistinguishable from science."<br>
</div>