Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
oarsinsync
on May 16, 2016
|
parent
|
context
|
favorite
| on:
How to Set Up Two-Factor Authentication for Login ...
> you would need to have a really severe threat scenario such that you can't even trust RSA with your keys
Such as the one where RSA was compromised and secrets were leaked, sadly.
Consider applying for YC's Spring batch! Applications are open till Feb 11.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
Such as the one where RSA was compromised and secrets were leaked, sadly.