|
You are here |
cuddletech.com | ||
| | | | |
juliaferraioli.com
|
|
| | | | | 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) are ways of securing accounts above and beyond normal password protection. Typically, we think of 2FA as something you know (your password) and something you have (a device). The idea is that if you compromise one, you still cant get access to the protected resource. A room protected by a keypad and ID card reader is a great example of 2FA. You might be able to guess the code, but youd also need a valid ID card to get access to the locked... | |
| | | | |
emmanuelbernard.com
|
|
| | | | | If you are curious or interested in FIDO2 security keys and how to use them as SSH keys or to sign your Git commits, this is the blog for you. If you are using Token2 FIDO2 keys and macOS, even more so. Why a FIDO2 security key? I wanted to explore and level up my security posture. FIDO2 security key have a few advantages, you can use them as passkeys on websites that support them. Passkeys are a passwordless solution that is seeing uptake even though things are still young. FIDO2 security keys are also ... | |
| | | | |
blog.thenewoil.org
|
|
| | | | | Password managers are thankfully becoming a mainstream topic. In addition to seeing commercials for certain ones from time to time, it's ... | |
| | | | |
blog.trailofbits.com
|
|
| | | This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates. | ||