I was going to reply to this and then decided I don’t care anymore.
No LS-120 or eSATA drives. :-)
How does the bad guy get to the page?
Then how does he get the user to enter in that code into their mobile device?
Got it.
Now do all 50 US states next.
Then buy them an iPod touch.
No company has any right to force people to use their private phones for company purposes.
Got a reputable source on that one that’s valid for all 50 states?
You have the right not to use your personal hardware for work, and the employer must provide the necessary equipment to accomplish your job.
Reputable Source?
Because you can’t call someone on a hardware token.
One requires the user to go to a bad page and get a spoofed 2FA code so the bad guy can log in.
Do you know how hard that is? Not worth it for 99% of hacks.
The other requires that the user read off their six digit code on their device.
Trivial easy since they already have the user’s password.
Who the hell can’t handle having to have two devices on them?
Hillary Clinton
From my stomach to my side? How is that worse? And who said she tormented me?
Thanks for the link.
But the plans were on display…”
“On display? I eventually had to go down to the cellar to find them.”
“That’s the display department.”
“With a flashlight.”
“Ah, well, the lights had probably gone.”
“So had the stairs.”
“But look, you found the notice, didn’t you?”
“Yes,” said Arthur, “yes I did. It was on display in the bottom of a locked filing cabinet stuck in a disused lavatory with a sign on the door saying ‘Beware of the Leopard.
I… I don’t get it.
The lemons are so sour they compressed the files?
eSATA fell out of fashion when USB got faster AND eSATA wasn’t hot plug and play.