2FA (Crypto.com Breach) Is Safe - If It's Implemented Correctly. Your Cell Phone Is The Problem
2 years ago
1
By which we aren't blaming you, we're blaming your technology.
IN this snippet from the podcast, we deep dive on alternative ways that 2FA could (and ideally should) have been implemented to help protect people. Nothing is a sure bet, but it's better than what we have.
In summary: As long as a cell phone is in the mix, there's a risk - thus why we never supported Crypto.com's "mobile only" development strategy.
Music: “Meadow Call” by Jan-Michael Hökenschnieder & Fachhochschule Dortmund, licensed under Creative Commons Attribution 4.0 International (CC BY 4.0).
Loading comments...
-
16:28
Talk Nerdy 2 Us
1 year agoLastPass Breach of Encrypted Password Vault, Cisco IP Phone Critical Flaw
64.9K9 -
16:20
Jamie Tree
1 year ago'This Collapse Has Just BEGUN...' - Chamath Palihapitiya Reacts to FTX & Crypto Crash
16 -
1:04
Bigshowshaun
9 months agoFalse Fema Signal warning alert turn off cell phones and devices on Oct 4th
84 -
1:02:40
One Outta One
1 year agoI'VE MADE MISTAKES! Inscryption (Part 10)
18 -
51:52
BULLNEWS
1 year agoFBI's ENCRYPTED PHONE PLATFORM - WORLDWIDE TAKEDOWN
2 -
1:39:33
DarkTaurus
1 year agoFNAF Security Breach FM
2742 -
13:16
Independent creator
1 year agoHow to secure your phone tutorial
29 -
1:30:47
Rob Braxman Tech
1 year agoYour Phone's Secure Features...are Useless? + Q&A
499 -
22:51
Grand Theft World
1 year agoCyber Security Gone Wrong | Secret Cell Phone Spyware
713 -
5:34
Louis Rossmann
1 year ago $0.05 earnedGrapheneOS strikes again; my phone wasn't compromised because I wasn't using Google's fk'd android
3004