Of course it can, but the correct question to ask is, can it be defeated?
Recently when asked “can Personal Identifier” be hacked the unvarnished truth is yes, of course it can. To be sure, anything one person can create another can hack, especially true of automated computer processes. When presented this question I always point out the bigger question is, “but can it be defeated?”
Google’s move is right for their business, but…
In a prior post, I poked a little fun at Google’s expense. In fairness to Google, I recognize here a subsequent news item clarifying “Google’s 85,000 employees avoid successful phishing attempts with a $20 USB security key”.
The problems with 2FA are obvious, or so I thought.
Below are my notes from an interview had with a cybersecurity consultant and expert.
Applications for Personal Identifier are many. Here is one that is a favorite.
The gorilla application in the room is, of course, the replacement of credentials-based identification verification. There are many others just as significant, one of which is gun safety.
I’m asked: “What if someone takes my smartphone?”
The query opened with “what if someone takes my smartphone?” A question framed in that “I gotcha” way. That’s cool, well-intentioned but…