I like to think of myself as a little too savvy for most phishing attacks. ![]() ![]() Where two factor auth perhaps might succeed is in limiting the damage of phishing attacks. It’s not a secret I’ve had a dim view of two factor auth, although many of my gripes are about implementation details. There’s a lot written about yubikeys and how you should use one, but nothing I’ve read answered a few of the specific questions I had. I have so far resisted two factor authorizing everything, but this seemed like another fun experiment. ![]() Everybody is getting real excited about yubikeys recently, so I figured I should get excited, too.
0 Comments
Leave a Reply. |