Viewing a single comment thread. View all comments

Ezl t1_isjntht wrote

Thanks for the response!

Yeah, I’ve used things like that for 2 factor authentication when connecting to work networks remotely. But I’m not sure if I can see that working in this scenario - if I steal the dongle I can now associate any bag with the token while also making the authentic bag valueless.

I’d think the actual bag itself would need to unalterably be connected to the token. Like, if this were science fiction, I’d have some unique ID encoded into the bags fabric at the molecular level or something like that.

Or am I missing something?

1

KustyTheKlown t1_isjrijq wrote

You aren’t missing anything, and I generally leave it to people smarter than me to work this stuff out. There are kinks but I also think legit use cases once the kinks are sorted

1