Talk:DRYAD

tw factor dubious
I'm inclined to remove the sentences about two-factor authentication using a secret offset. It seems of dubious value as an attacker who has the code sheet can figure out the offset by listening to an authentication exchange or two. Any reference that this is done in practice?--agr (talk) 12:14, 8 March 2013 (UTC)