2FA (Crypto.com Breach) Is Safe - If It's Implemented Correctly. Your Cell Phone Is The Problem

2 years ago
1

By which we aren't blaming you, we're blaming your technology.

IN this snippet from the podcast, we deep dive on alternative ways that 2FA could (and ideally should) have been implemented to help protect people. Nothing is a sure bet, but it's better than what we have.

In summary: As long as a cell phone is in the mix, there's a risk - thus why we never supported Crypto.com's "mobile only" development strategy.

Music: “Meadow Call” by Jan-Michael Hökenschnieder & Fachhochschule Dortmund, licensed under Creative Commons Attribution 4.0 International (CC BY 4.0).

Loading comments...