Comment by alt227 5 hours ago IMO if it is possible to use a system wrongly which undermines its security, it is already broken. 4 comments alt227 Reply lmz 5 hours ago This is how we get sites that block software tokens and only allow a whitelist of hardware based tokens. lazide 5 hours ago There is no system which cannot be used wrongly in a way which undermines it’s security. Jean-Papoulos 4 hours ago I can chuck a brick at your head. Clearly the brick is broken justincormack 2 hours ago I mean, TOTP is one of the earliest 2 factor systems, and works least well.
lmz 5 hours ago This is how we get sites that block software tokens and only allow a whitelist of hardware based tokens.
lazide 5 hours ago There is no system which cannot be used wrongly in a way which undermines it’s security.
justincormack 2 hours ago I mean, TOTP is one of the earliest 2 factor systems, and works least well.
This is how we get sites that block software tokens and only allow a whitelist of hardware based tokens.
There is no system which cannot be used wrongly in a way which undermines it’s security.
I can chuck a brick at your head. Clearly the brick is broken
I mean, TOTP is one of the earliest 2 factor systems, and works least well.