What priority keys are you talking about?
Own your 2FA.
What priority keys are you talking about?
Own your 2FA.
'Hardware' keysfobs brother. but no, you can't "own" your 2FA. Cause it's a web2.0 server based concept.
What you want is to generate your own private key and then call it a day :-)
Be insecure, thatโs your choice.
You can own your other factors, youโre just wrong and embracing it.
MFA you can own:
- An email domain and server
- A certificate
- open source Fido2 Security key
- Geolocation via IP address or GPS or network node
- Time-Based OTP
The only one of those that technically relies on someone else is your DNS provider for your mail domain or ISP for geolocation.
One man lives an in a house surrounded by good neighbours.
Another man lives in a house with five locks and a barking dog alarm.
Which of the two men would you call insecure?