Google Authenticator weaknesses

Discussion in 'other security issues & news' started by dogbite, Nov 30, 2014.

  1. dogbite

    dogbite Registered Member

  2. deBoetie

    deBoetie Registered Member

    It would be more interesting to see an analysis of the current U2F approach.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice