summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md7
1 files changed, 1 insertions, 6 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 254840f..868188b 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -2,9 +2,8 @@
title: "Comparing Multi-Factor Authentication Methods"
date: 2022-08-05T00:00:00
draft: false
-makerefs: false
---
-I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
+I made a nice little chart comparing [multi-factor authentication](https://www.wikipedia.org/wiki/Two-factor_authentication) methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
## Multi-Factor Authentication Chart
```chart comparing multi-factor authentication methods
@@ -29,7 +28,3 @@ I made a nice little chart comparing multi-factor authentication[1] methods from
## Conclusion
In terms of security, any of these options is better than nothing. But if you want maximum security with the least personal data exposure, just go with hardware security keys or time-based one-time passwords. Other authentication methods are either not very secure or they collect personal information.
-
-
-Links:
-[1: Multi-Factor Authentication](https://www.wikipedia.org/wiki/Two-factor_authentication)