i am yet again reminded of how horrid two factor authentication is
-
-
actually it might be possible to make login restricted to a single machine (and anyone who knows the specs of the machine) send some hashed combination of hardware details over end-to-end encryption, verify the hash+password+username match to allow access
-
this might actually be even worse than depending on phone service though
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.