They rolled it out primarily between Educational Facilities and Campuses under several Federal Grants. Then they tied it to Medical Institutions claiming it was to “Protect Research”.
So the entire rollout was this idea at face value of preventing people from stealing info.
Thing is that never made sense. Now we know exactly what it was.
By the way Sun Microsystems was contracted to do most of the build out and retention. They installed ASS TONS of backup servers at Community Colleges around Texas which is where I worked on it.
If you know any of the history of Sun it’s a - DARPA deal all the way through.
SUN - Stanford University Network - was where the first internet packets even moved.
Negative. All I know is that it's up to the network design to implement their chosen authentication system.
I can only speculate on how it would look. I know for the Educational Institution I worked a contract at - they had closed terminals that required security badge swipes to access the terminals. After your Swiped a specific login shel was given to you that would follow you around to whatever terminal you were accessing from. Imagine a ghosted remote desktop that was connected to your badge. This was in 2004
Very interesting..🤔
Yep. I have physically worked on it.
They rolled it out primarily between Educational Facilities and Campuses under several Federal Grants. Then they tied it to Medical Institutions claiming it was to “Protect Research”.
So the entire rollout was this idea at face value of preventing people from stealing info.
Thing is that never made sense. Now we know exactly what it was.
By the way Sun Microsystems was contracted to do most of the build out and retention. They installed ASS TONS of backup servers at Community Colleges around Texas which is where I worked on it.
If you know any of the history of Sun it’s a - DARPA deal all the way through.
SUN - Stanford University Network - was where the first internet packets even moved.
Any knowledge you can share about the authentication system? Any way to spoof an ID or otherwise remain anonymous?
Negative. All I know is that it's up to the network design to implement their chosen authentication system.
I can only speculate on how it would look. I know for the Educational Institution I worked a contract at - they had closed terminals that required security badge swipes to access the terminals. After your Swiped a specific login shel was given to you that would follow you around to whatever terminal you were accessing from. Imagine a ghosted remote desktop that was connected to your badge. This was in 2004