At least according to the newly proposed “National Strategy for Trusted Identities in Cyberspace” and Obama’s Cyber Zsar, Howard Schmidt.
Sounds too good to be true, right? And like so many other simple ideas, that at first seem to make perfect sense, it really is too good to be true.
Sure, this tactic will hinder some hackers. Your Granny, your seven year-old, and your dog will find it next to impossible to bypass this. But then again, they aren’t really able to do much harm anyway. Whether any serious criminal or foreign entity will be negatively impacted is highly doubtful.... Why? Because hackers don’t play by the rules. They will use and abuse other peoples’ connections, devices and identities against their owners’ will, permission, and knowledge...."
Link to Original Source