|
You are here |
pattern.com | ||
| | | | |
jamesg.blog
|
|
| | | | | The image above is from XKCD's "Instagram" comic. Instagram is a prime example of a walled garden. | |
| | | | |
www.kusari.dev
|
|
| | | | | The Secure By Design Pledge is a great starting point, but it can't be the end. | |
| | | | |
www.auraads.co.uk
|
|
| | | | | Social media is full of opportunities. Find out just how effective social media ad campaigns are here. | |
| | | | |
prezu.ca
|
|
| | | Part 3 is the last part in this short cycle. Here I'll explain all the details around Time-based One-Time Password algorithm. I'll finish up by also elaborating on things common to both, HMAC-Based One-Time Password algorithm: QR Codes used to easily transfer secrets from the server to the Authenticator app Base32 algorithm - used to store non-printable secret in a URI (effectively stored by the QR Codes mentioned above). TOTP One way to avoid the problems with lack of feedback between server and the app... | ||