Episodes
Privacy guides
Stories
Donate
Don’t lose your
|
Learn more
Published to
YouTube
4 years ago
Why most 2FA implementations are nasty and how to setup OTP Auth on iOS
In this episode, we explore why most 2FA implementations are nasty and how to setup OTP Auth on iOS.
Links
Have I been pwned?
OTP Auth
Suggested episodes
Why well-implemented 2FA mitigates both infosec and opsec attack vectors
In this episode, we explore why well-implemented 2FA mitigates both infosec and opsec attack vectors.
Explore
Copyright (c) Sun Knudsen
Get in touch