summaryrefslogtreecommitdiff
path: root/content/entry/comparing-multi-factor-authentication-methods.md
diff options
context:
space:
mode:
Diffstat (limited to 'content/entry/comparing-multi-factor-authentication-methods.md')
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md1
1 files changed, 1 insertions, 0 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 22d163b..834247e 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -1,6 +1,7 @@
---
title: "Comparing Multi-Factor Authentication Methods"
date: 2022-08-05T00:00:00
+tags: ['computing']
draft: false
---
I made a nice little chart comparing [multi-factor authentication](https://www.wikipedia.org/wiki/Two-factor_authentication) methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is: