I was going to reply to this and then decided I don’t care anymore.
No LS-120 or eSATA drives. :-)
How does the bad guy get to the page?
Then how does he get the user to enter in that code into their mobile device?
Got it.
Now do all 50 US states next.
Then buy them an iPod touch.
No company has any right to force people to use their private phones for company purposes.
Got a reputable source on that one that’s valid for all 50 states?
You have the right not to use your personal hardware for work, and the employer must provide the necessary equipment to accomplish your job.
Reputable Source?
Because you can’t call someone on a hardware token.
One requires the user to go to a bad page and get a spoofed 2FA code so the bad guy can log in.
Do you know how hard that is? Not worth it for 99% of hacks.
The other requires that the user read off their six digit code on their device.
Trivial easy since they already have the user’s password.
Who the hell can’t handle having to have two devices on them?
Hillary Clinton
I think someone else put the game.
deleted by creator
Turns out IPv6 wasn’t working so I had a heck of a time tracking that down.
Just disable IPv6 like most people and move on /s (kinda)
Sheet music.
eSATA fell out of fashion when USB got faster AND eSATA wasn’t hot plug and play.