no banana@lemmy.world to Lemmy Shitpost@lemmy.world · 1 month agoOk boomerlemmy.worldexternal-linkmessage-square390fedilinkarrow-up11.52Karrow-down144
arrow-up11.47Karrow-down1external-linkOk boomerlemmy.worldno banana@lemmy.world to Lemmy Shitpost@lemmy.world · 1 month agomessage-square390fedilink
minus-squareyetAnotherUser@discuss.tchncs.delinkfedilinkarrow-up2·1 month agoWell, TOTP prevents at least these attack vectors, even for tech-illiterate people: Unnoticed data base leaks being used to gain full access to people’s accounts Credential stuffing (using another service’s leaked credentials to gain access) With TOTP there must be at least some contact between the “hacker” and the victim.
Well, TOTP prevents at least these attack vectors, even for tech-illiterate people:
With TOTP there must be at least some contact between the “hacker” and the victim.