yes, the more layers of security, the better, even if it is just a futile matter of time to consume the time of an ATP.
yes, the more layers of security, the better, even if it is just a futile matter of time to consume the time of an ATP.
Ah, that must be it. 2FA is still a very good security feature to have.
But there is nothing only you know that is still useful because a secret must be shared in order to be useful (unless you just have full disk encryption and then when it is unlocked and network connected, it is still vulnerable). In short, admins could change your password since you are not the sole admin of your own server but then you would have to have mass appeal to be “useful”, i.e. popular.
In theory, Tim Cook might have a keybearer who could usurp the throne with all the proprietary OEM crypto keys that only the Company knows, but everyone knows who the CEO is and the keybearer could get in big trouble unless he had an army…
Things can be changed on the server side and the network is not the same as the device: these are technology truths some people refuse to ever understand.
No, nothing shady. Just was notified there was a mistake on the server end. Perhaps tmi to elaborate…
This is what I thought. I keep telling people they don’t exclusively own their passwords / security tokens once they give it to a site.
If I shared encrypted info that I kept encrypted, I guess it would still be mine but no one could then read it.
This is what I thought. I keep telling people they don’t exclusively own their passwords / security tokens once they give it to a site. Salted hashes to obscure the pw don’t even matter since the admin could also bypass that. Tanks for the validation.
Do you want to show us what that looks like in assembly, ASCII from machine code? …ha, ha, ha, no!
Depends on the device, I know. Such a pain without the higher level languages.
What would it look like for ARM android touch screens? Just for one character…
But if some characters go missing or are exchanged for others for no discernable reason, then might that be an exploit on a EC or assembly level?
Silver fox with perfect aim! Bond cannot fail!