hosts, and one of them leaks the secret to an adversary, all hosts are
compromised. This is not the case with the first approach.
+The particular data structure is outlined in the picture:
+![](auth-data-structure.svg)
+
## Module Operation
Authentication file, containing nonce, encrypted shared secret,
## Getting the Source
-Pich the tarball
-[here](http://www.average.org/chal-resp/auth/pam_pcsc_cr-0.9.0.tar.xz),
+Check the [project homepage](http://www.average.org/chal-resp-auth/).
+
+Pick the source tarball
+[here](http://www.average.org/chal-resp-auth/pam_pcsc_cr-0.9.1.tar.xz),
or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or
[browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary)
the git repo.