sharing programmer-to-programmer. please enjoy. pages are formatted for landscape tablet, laptop, or monitor.

hestia, experimental getty daemon

greek, hestia-polyolbis (many praises)

in production

hestia is my getty daemon, managing requested devices, launching hearth (see below) for potential users, creating appropriate shells if successful, and recapturing control after a time-out, logon failure, or log-out.

was this absolutely necessary, no. but, after managing an external, high-risk security environment for a large global company, i wanted to capture some of the ideas and experiment with novel techniques for averting hacks.

password, phrase, code. opted for layered technique where the password is split and added to, rather than replaced.

presented data. letters, numbers, and symbols are presented in apparently random fashion, but some must be entered.

question/answer. several pieces of screen data are call-and-response with user specific knowledge being required.

time-outs. the device then has configurable non-response period after failures to slow hacks down to a crawl.

pre-login. to somewhat avert mass attacks, specific data is required to gain a log-in cycle to help overwhelming hacks.

experimental. remember, it’s not a product, it’s just a personal test bed for me to check sustainability and usefulness.

is it perfect? LOL, not even close. but, i can combine with phones, pin servers, etc to add another layer to security.

source code is GPL3 licensed, https://github.com/heatherlyrobert/hestia

Previous
Previous

rapid touch writing with gregg shorthand (act)

Next
Next

rapid keyboard input with colemak-arensito (prd)