hosts, and one of them leaks the secret to an adversary, all hosts are
compromised. This is not the case with the first approach.
+The particular data structure is outlined in the picture:
+![](auth-data-structure.svg)
+
## Module Operation
Authentication file, containing nonce, encrypted shared secret,
## Getting the Source
-Note that as of December 2013, this is a work in progress. You can
-[clone](git://git.average.org/git/pam_pcsc_cr.git) or
+Check the [project homepage](http://www.average.org/chal-resp-auth/).
+
+Pick the source tarball
+[here](http://www.average.org/chal-resp-auth/pam_pcsc_cr-0.9.1.tar.xz),
+or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or
[browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary)
the git repo.