Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

- I am no security person myself. -

I always liked this idea: https://krypt.co/

Basically using an entirely separate device to authorize your access. 2FA devices still connect to the computer requesting access, I liked the idea that your phone act as the gatekeeper without ever touching your computer.

Problem is: It's a phone. Apple has done much but I wouldn't trust it either.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: