summaryrefslogtreecommitdiff
path: root/content/entry/comparing-multi-factor-authentication-methods.md
diff options
context:
space:
mode:
Diffstat (limited to 'content/entry/comparing-multi-factor-authentication-methods.md')
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md1
1 files changed, 0 insertions, 1 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 7d28c4d..0346f5e 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -3,7 +3,6 @@ title: "Comparing Multi-Factor Authentication Methods"
date: 2022-08-05T00:00:00
draft: false
---
-# Comparing Multi-Factor Authentication Methods
I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
## Multi-Factor Authentication Chart