bdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 1 day agoI love password based loginlemmy.worldimagemessage-square175linkfedilinkarrow-up11.2Karrow-down123
arrow-up11.18Karrow-down1imageI love password based loginlemmy.worldbdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 1 day agomessage-square175linkfedilink
minus-squareFiery@lemmy.dbzer0.comlinkfedilinkarrow-up1·8 hours agoDepending on the security needs using hardware based security as a second factor while still requiring some other form of auth is not actually a bad idea.
Depending on the security needs using hardware based security as a second factor while still requiring some other form of auth is not actually a bad idea.