Sun
EpisodesPrivacy guidesStories
Don’t lose your
|


Published to YouTube 4 years ago

Why most 2FA implementations are nasty and how to setup OTP Auth on iOS

Why most 2FA implementations are nasty and how to setup OTP Auth on iOS

In this episode, we explore why most 2FA implementations are nasty and how to setup OTP Auth on iOS.

Links
Have I been pwned?
OTP Auth
Suggested episodes
Why well-implemented 2FA mitigates both infosec and opsec attack vectors
Why well-implemented 2FA mitigates both infosec and opsec attack vectors
In this episode, we explore why well-implemented 2FA mitigates both infosec and opsec attack vectors.
Copyright (c) Sun Knudsen
Get in touch