Abstract:How to properly implement two factor authentication. Common problems with implementations, what to look out for, and the worst I've ever seen.
Bio:Steve Thomas, aka Sc00bz, has been studying and optimizing time-memory tradeoffs since November 2007. He broke two poorly constructed hash functions, MySQL323 and XSHA1, as well as Cryptocat. He graduated from Northern Illinois University with a double major Computer Science and Math. He still regrets not taking ballet classes.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek