What priority keys are you talking about?

Own your 2FA.

Reply to this note

Please Login to reply.

Discussion

'Hardware' keysfobs brother. but no, you can't "own" your 2FA. Cause it's a web2.0 server based concept.

What you want is to generate your own private key and then call it a day :-)

Be insecure, thatโ€™s your choice.

You can own your other factors, youโ€™re just wrong and embracing it.

MFA you can own:

- An email domain and server

- A certificate

- open source Fido2 Security key

- Geolocation via IP address or GPS or network node

- Time-Based OTP

The only one of those that technically relies on someone else is your DNS provider for your mail domain or ISP for geolocation.

One man lives an in a house surrounded by good neighbours.

Another man lives in a house with five locks and a barking dog alarm.

Which of the two men would you call insecure?

Neither, and the Internet acts like neither.

Tell me brother, I want to know everything.

Before I listen to an enlightening explanation of how the internet works.

Would it be too much to ask for a second opinion, preferrably female? ๐Ÿ‘ ๐Ÿ™๐Ÿ™‚ pretty please? ๐Ÿ˜Š