Explore >> Select a destination


You are here

supabase.com
| | juliaferraioli.com
2.5 parsecs away

Travel
| | 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) are ways of securing accounts above and beyond normal password protection. Typically, we think of 2FA as something you know (your password) and something you have (a device). The idea is that if you compromise one, you still cant get access to the protected resource. A room protected by a keypad and ID card reader is a great example of 2FA. You might be able to guess the code, but youd also need a valid ID card to get access to the locked...
| | labanskoller.se
2.2 parsecs away

Travel
| | You probably use an "authenticator app" such as Google Authenticator to enable two-step verification (sometimes called two-factor authentication, 2FA, or multi-factor authentication, MFA) for an online account. The method is called Time-Based One-Time Password Algorithm (TOTP) and is standardized in RFC 6238. In October 2017 when I evaluated HashiCorp Vault for generating and storing TOTP secrets for a system at work I realized that the Android version and iOS version of Google Authenticator differed a lot when it comes to which modes are supported.
| | feeding.cloud.geek.nz
2.4 parsecs away

Travel
| | [AI summary] This article discusses the current state of TOTP two-factor authentication in 2025, highlighting interoperability issues and security considerations with various authenticator apps.
| | blog.pcc.com
19.9 parsecs away

Travel
| Cybersecurity is a business priority all year round. Learn the 9 top ways PCC recommends to keep your practice's data secure.