summaryrefslogtreecommitdiff
path: root/content/entry/comparing-multi-factor-authentication-methods.md
diff options
context:
space:
mode:
Diffstat (limited to 'content/entry/comparing-multi-factor-authentication-methods.md')
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 834247e..16373bd 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -4,7 +4,7 @@ date: 2022-08-05T00:00:00
tags: ['computing']
draft: false
---
-I made a nice little chart comparing [multi-factor authentication](https://www.wikipedia.org/wiki/Two-factor_authentication) methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
+I made a nice little chart comparing [multi-factor authentication](https://en.wikipedia.org/wiki/Two-factor_authentication) methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
## Multi-Factor Authentication Chart
```chart comparing multi-factor authentication methods