sundialsvcs |
07-10-2015 08:06 AM |
The only "real" way to identify a computer is to use an encrypted connection with unique digital certificates at both ends. Anyone who succeeds in establishing a connection must be in possession of a certificate that can be traced uniquely to him. The crypto transport further assures that the messages will be received as-tendered.
VPN, of course, is a de facto method of doing this, which also has the advantage of being transparent to both parties. If properly secured (i.e. "don't use PSKs == passwords"), the tunnel is reliable but invisible. It can be implemented in hardware.
|