Beware of Pseudo-2 Factor Authentication
Please imagine that you are comparing two models of smartphones — Model A with a default pincode and Model B with a default pincode and biometrics.
You first hear that Model A is protected by pincode while Model B is protected by pincode and biometrics.
You then hear that Model A can be unlocked by pincode while Model B can be unlocked by pincode and biometrics.
You now hear that Model A can be attacked by pincode while Model B can be attacked by pincode and biometrics.
Which of Model A and Model B do you wish to use where you need good security?
Should you be interested to know where we are going, please watch this 2-minute video — https://youtu.be/wuhB5vxKYlg
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
< Videos on YouTube>