{"id":104231,"date":"2014-02-17T12:43:32","date_gmt":"2014-02-17T12:43:32","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=104231"},"modified":"2014-02-17T12:43:32","modified_gmt":"2014-02-17T12:43:32","slug":"google-intentioneaza-sa-inlocuiasca-parolele-cu-un-sunet-imperceptibil-pentru-urechea-umana","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=104231","title":{"rendered":"Google inten\u0163ioneaz\u0103 s\u0103 \u00eenlocuiasc\u0103 parolele cu un sunet imperceptibil pentru urechea uman\u0103"},"content":{"rendered":"<p>\nTehnologia este bazat\u0103 pe un sunet pe care doar telefonul \u00eel poate percepe, astfel \u00eenc\u00e2t pentru accesare este necesar\u0103 simpla apropiere a telefonului de laptop sau de calculator, relateaz\u0103 Businessinsider.com. Tehnologia func\u0163ioneaz\u0103 \u00een felul urm\u0103tor: site-urile care au instalat sistemul SlickLogin transmit un sunet, respectiv date criptate \u00een ultrasonic, pe care doar telefonul \u00eel percepe. Dup\u0103 decodificare, telefonul trimite \u00eenapoi c\u0103tre site confirmarea c\u0103 utilizatorul e real \u015fi nu un hacker.<\/p>\n<p>\nAceast\u0103 metod\u0103 de conectare este extrem de eficient\u0103 deoarece sunetul este altul la fiecare accesare a paginii. Modul de operare al unui hacker este bazat pe automatisme \u015fi exclude ideea de a sta l\u00e2ng\u0103 calculator de fiecare dat\u0103 c\u00e2nd vrea s\u0103 se conecteze la o pagin\u0103 web.<\/p>\n<p>\nFaptul c\u0103 nu vor mai avea parole ar trebui s\u0103 \u00eei bucure pe cei care folosesc date de acces, \u00eens\u0103 reprezentan\u0163ii Google avertizeaz\u0103 c\u0103 mai sunt mul\u0163i pa\u015fi de urmat p\u00e2n\u0103 la implementarea eficient\u0103 a sistemului.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google a achizi\u0163ionat SlickLogin, un start-up din Israel care dezvolt\u0103 o tehnologie menit\u0103 s\u0103 simplifice accesul la website-uri care necesit\u0103 date de autentificare.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[238,16767,170,32328,15146,32783,15359,7442,373,16353,32766,17331,5431,7356,32779,275,218,6276,32882,5591,80,9789,16766,7287,3025,204,10173,30047],"class_list":["post-104231","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-acces","tag-accesare","tag-achizitie","tag-apropiere","tag-avertizare","tag-bucurie","tag-calculator","tag-dezvoltare","tag-eficienta","tag-excludere","tag-folosire","tag-functionare","tag-google","tag-hacker","tag-implementare","tag-inlocuire","tag-israel","tag-laptop","tag-metoda","tag-real","tag-refuz","tag-reprezentanti","tag-simplificare","tag-sistem","tag-site","tag-tehnologie","tag-telefon","tag-trimitere"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/104231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=104231"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/104231\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=104231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=104231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=104231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}