Yes. In my experience, there is a non-negligible group of opportunistic attackers that can do password reuse/kid’s name password but will not/cannot escalate. This doesn’t apply to any high-value target or to systematic phishers (who have economic concerns).
-
-
(I have hundreds of security keys in my office; I give them out like candy, btw.

)Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I think you think my argument is "just do everything perfectly", but that isn't what I've said? Can you email me to discuss it, this is tough on twitter.
-
No I don’t think that’s what you think! But happy to email. zeynep@technosociology. org I have a lot of experience with some types of users and their threats—not the ones who face big risks but everyday, low-profile folks. Different threats and threat model. Unexpected behaviors.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
