summaryrefslogtreecommitdiff
path: root/content/entry/comparing-multi-factor-authentication-methods.md
diff options
context:
space:
mode:
Diffstat (limited to 'content/entry/comparing-multi-factor-authentication-methods.md')
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md1
1 files changed, 0 insertions, 1 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 37307aa..7dc3f40 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -2,7 +2,6 @@
title: "Comparing Multi-Factor Authentication Methods"
date: 2022-08-05T00:00:00
draft: false
-pageinfo: true
---
I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is: