|
You are here |
supabase.com | ||
| | | | |
labanskoller.se
|
|
| | | | | Last week my favorite IT security podcast Bli säker (Become Secure in English) published the episode The Epochalypse and the QR Code (only in Swedish) where they explained the techonology behind mobile authenticator apps. I felt I needed to refresh my TOTP algorithm support investigation from 2019 before the recording of the next episode of the Bli säker podcast. :) So this is an update to the blog post I published in July 2019 called Many Common Mobile Authenticator Apps Accept QR Codes for Modes They D... | |
| | | | |
educatedguesswork.org
|
|
| | | | | [AI summary] This article discusses advanced password security mechanisms, focusing on technologies like two-factor authentication, password authenticated key agreement, and public key authentication to enhance web login security beyond traditional passwords. | |
| | | | |
fingerprint.com
|
|
| | | | | Explore the benefits and challenges of passwordless authentication for securing online interactions. | |
| | | | |
pboyd.io
|
|
| | | Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean.... | ||