Hacker News new | past | comments | ask | show | jobs | submit login

That's called wishful thinking.



Which is what the parent was engaging in. The next guy then asked how it would work. I gave an example of how it could work. I'm not sure what the disagreement is here.


Your example is what I called wishful thinking. You haven't explained how it could work without authenticating to somebody's walled garden.

The original idea of some magical screen you walk up to with all of these abilities and none of the limitations of walled gardens is also wishful thinking; however it doesn't go so far as to claim it's an example of how to accomplish this.


Your imagination can't extend my example to something more private? You can't envision an NFC-based OpenID authentication connecting to your private server containing the information you wish to bring up on the screen? You can't imagine a Diaspora-style open source kiosk? You can't imagine even bringing up Chrome in Incognito Mode and feeding it data from your personal KeePass?

I was using an example I figured everyone around here would be familiar enough with to extrapolate the possibilities. If it actually existed, we wouldn't be wishing for it to happen. The whole point is that it's *not" "magical", it's completely possible, yet it doesn't actually exist.


Sure, I can envision that. But that's not what the original idea was. It was a box which recognized you (presumably via some form of computer vision). How could such a device work without having a database to match against people's identities?

Your NFC idea is a lot more plausible than the original idea.


I had read the original post as being open to the authentication method of choice. What you describe is certainly one authentication method (inherence, aka what you are or do). Most common is knowledge, aka a password or unique URL. NFC would be ownership, or what you have. Two of these would allow you to keep your own database. I guess the confusion came from our different interpretations of what the original poster meant by "recognize". I linked recognition with authentication, of which there are three methods to be used, and picked the most likely in my mind. I'm knee deep in authentication principles most of the day.

Sorry if I came off as hostile, it was a miscommunication.


>Sorry if I came off as hostile, it was a miscommunication.

Story of the internet, really. I get down-voted a lot on Reddit because people confuse my directness for hostility. I've tried couching my arguments with a more passive voice but sometimes it becomes too much of a hassle.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: