summaryrefslogtreecommitdiff
path: root/content/entry/comparing-multi-factor-authentication-methods.md
diff options
context:
space:
mode:
Diffstat (limited to 'content/entry/comparing-multi-factor-authentication-methods.md')
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md1
1 files changed, 1 insertions, 0 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
index 7dc3f40..254840f 100644
--- a/content/entry/comparing-multi-factor-authentication-methods.md
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -2,6 +2,7 @@
title: "Comparing Multi-Factor Authentication Methods"
date: 2022-08-05T00:00:00
draft: false
+makerefs: false
---
I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is: