Hacker News new | past | comments | ask | show | jobs | submit login

If you had a keylogger, it wouldn't really matter how good your authentication scheme is…





Keyloggers aren’t very useful when authentication uses TOTPs from a hardware token.

TOTPs from a hardware tokens aren't very useful if system doesn't support TOTP as an auth backend.



Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: