Terence Eden on Nostr: The classic multi-authentication security is based around the trifecta of: * ...
The classic multi-authentication security is based around the trifecta of:
* Something you know (e.g. a password).
* Something you have (e.g. a smart card)
* Something you are (e.g. a fingerprint)
What if we add a fourth?
* Something someone else can verify
https://shkspr.mobi/blog/2013/08/two-factor-authentication-and-the-police-state/
Would you be happy if you had to call a trusted contact to get your temporary 2FA code?
* Something you know (e.g. a password).
* Something you have (e.g. a smart card)
* Something you are (e.g. a fingerprint)
What if we add a fourth?
* Something someone else can verify
https://shkspr.mobi/blog/2013/08/two-factor-authentication-and-the-police-state/
Would you be happy if you had to call a trusted contact to get your temporary 2FA code?