From d20eeb557fede76df29a5e0369be193489d3747e1259c8d0940bfab39d9ccee9 Mon Sep 17 00:00:00 2001 From: Nicholas Johnson Date: Fri, 17 Feb 2023 00:00:00 +0000 Subject: Convert refs: comparing-multi-factor-authentication-methods --- content/entry/comparing-multi-factor-authentication-methods.md | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) (limited to 'content') diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md index 254840f..868188b 100644 --- a/content/entry/comparing-multi-factor-authentication-methods.md +++ b/content/entry/comparing-multi-factor-authentication-methods.md @@ -2,9 +2,8 @@ title: "Comparing Multi-Factor Authentication Methods" date: 2022-08-05T00:00:00 draft: false -makerefs: false --- -I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is: +I made a nice little chart comparing [multi-factor authentication](https://www.wikipedia.org/wiki/Two-factor_authentication) methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is: ## Multi-Factor Authentication Chart ```chart comparing multi-factor authentication methods @@ -29,7 +28,3 @@ I made a nice little chart comparing multi-factor authentication[1] methods from ## Conclusion In terms of security, any of these options is better than nothing. But if you want maximum security with the least personal data exposure, just go with hardware security keys or time-based one-time passwords. Other authentication methods are either not very secure or they collect personal information. - - -Links: -[1: Multi-Factor Authentication](https://www.wikipedia.org/wiki/Two-factor_authentication) -- cgit v1.2.3