• wolframhydroxide@sh.itjust.works
    link
    fedilink
    arrow-up
    7
    arrow-down
    2
    ·
    2 days ago

    And don’t forget required 2-factor authentication, in an age where that becomes 1-factor authentication as soon as someone has your phone, because both factors are accessible there!

    2FA is utterly worthless in the age of smartphones, and whenever my employer tries to implement it, I refuse and tell them that, if they want me to do 2FA, they can either provide me with a work phone, or they can give me a USB key that is just going to sit in my desk drawer.

      • wolframhydroxide@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        17 hours ago

        Hence why I tell my employers that I’m good with h That option (see the last bit of the comment to which you replied) the problem is that this method of 2FA is not implemented commonly, and so most systems I’ve encountered bug out when trying to set it up.

    • A Wild Mimic appears!@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      2 days ago

      which still requires someone to swipe the phone and the owner not recognizing it long enough to do a remote wipe. I am not someone who hangs on the smartphone 8 hours per day, and even i would realize my phone is gone within 15 - 30 minutes, giving an attacker a pretty small time window to act.

      e: and they have to break into the phone as well - if it’s updated, that might buy more than enough time