summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNicholas Johnson <nick@nicholasjohnson.ch>2023-02-17 00:00:00 +0000
committerNicholas Johnson <nick@nicholasjohnson.ch>2023-02-17 00:00:00 +0000
commitd20eeb557fede76df29a5e0369be193489d3747e1259c8d0940bfab39d9ccee9 (patch)
tree5e3e075c58bab2c7f62a55e5b6eb74076041037377d58069dac06e338fb0d393
parent2b12fcb8489df88e72d5f378b77b04be3f28bbd6d02e55d6f983d3fcdad58562 (diff)
downloadjournal-d20eeb557fede76df29a5e0369be193489d3747e1259c8d0940bfab39d9ccee9.tar.gz
journal-d20eeb557fede76df29a5e0369be193489d3747e1259c8d0940bfab39d9ccee9.zip
Convert refs: comparing-multi-factor-authentication-methods
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md7
1 files changed, 1 insertions, 6 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 254840f..868188b 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -2,9 +2,8 @@
title: "Comparing Multi-Factor Authentication Methods"
date: 2022-08-05T00:00:00
draft: false
-makerefs: false
---
-I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
+I made a nice little chart comparing [multi-factor authentication](https://www.wikipedia.org/wiki/Two-factor_authentication) methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
## Multi-Factor Authentication Chart
```chart comparing multi-factor authentication methods
@@ -29,7 +28,3 @@ I made a nice little chart comparing multi-factor authentication[1] methods from
## Conclusion
In terms of security, any of these options is better than nothing. But if you want maximum security with the least personal data exposure, just go with hardware security keys or time-based one-time passwords. Other authentication methods are either not very secure or they collect personal information.
-
-
-Links:
-[1: Multi-Factor Authentication](https://www.wikipedia.org/wiki/Two-factor_authentication)