Authenticating client software to a server – 10 years later A little over 10 years ago I asked a question: