© 2023 Hashnode
#2fa
Ikenna was an active user of WhatsApp, using it to stay connected with friends, family, and colleagues. One day, he received an alarming message from a close friend warning him about WhatsApp hackers …
Introduction Are you tired of building user authentication systems from the ground up? Do you want to benefit from the power and security of OAuth 2.0 without having to write your own code? Look no fu…
You may have entered a 6-digit code from a 2FA app like Google Authenticator 😬, but where did this code come from? The answer lies within the QR code and the inner workings of the Time-based One-time…
Previously on... In my previous post, I stated that I will begin a series that will give the reader insight into my journey of protecting my data. I summed up multiple subjects I want to explore. I al…
With a compromised password, it’s not just your account or information that remains vulnerable. Hackers typically steal passwords as the first leg of a larger attack; and build up to exploit your comp…
Before considering the term “Two-factor Authentication” we should understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done online, some…
Before considering the term “Two-factor Authentication”, there is a need to understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done on…
Two-factor authentication (2FA) is a security process in which a user provides two different authentication factors, other than a password to verify their identity. Implementing 2FA can enhance the se…
Authy is a Two-Factor-Authentication software focused on security. Unfortunately Authy is only supported as a snap package in Linux. But everybody hates snap. So there is an alternate way to install a…
In the digital world, user authentication is essential for maintaining secure access to online accounts and resources. User authentication verifies the identity of a user before granting access to sen…