G-Rules of Behavior

password + ssh login key (I know my password; I have my laptop that has my ssh key on it…) smart card + pin to activate it. ... Typical assumption – we don’t physically control the network so adversary can (a) see my packets, (b) change my packets, (c) insert new packets, (d) prevent my … ................
................