hosts, and one of them leaks the secret to an adversary, all hosts are
compromised. This is not the case with the first approach.
hosts, and one of them leaks the secret to an adversary, all hosts are
compromised. This is not the case with the first approach.
## Module Operation
Authentication file, containing nonce, encrypted shared secret,
## Module Operation
Authentication file, containing nonce, encrypted shared secret,
-Pich the tarball
-[here](http://www.average.org/chal-resp/auth/pam_pcsc_cr-0.9.0.tar.xz),
+Check the [project homepage](http://www.average.org/chal-resp-auth/).
+
+Pick the source tarball
+[here](http://www.average.org/chal-resp-auth/pam_pcsc_cr-0.9.1.tar.xz),
or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or
[browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary)
the git repo.
or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or
[browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary)
the git repo.