Posts tagged 'security'     🔎 Search:

Fortressa - Create Your Own Private VPN

Net neutrality is under threat, and your Internet activity is being recorded and sold to the highest bidder. I built Fortressa to combat this theft and protect your privacy.

U2F Hardware Security Keys

Universal 2nd Factor (U2F) hardware security keys and multi-factor authentication (MFA) combine to provide strong security and good usability — the best of both worlds.

Multi-Factor Authentication, Phones, and SMS

Most implementations of multi-factor authentication (MFA), also known as two-factor authentication (2FA), rely on sending codes via SMS text messages or phone calls. There are serious problems with this approach.

Don’t Make Your Own Two-Factor Authentication App

Multi-factor authentication can be poorly implemented in a multitude of ways, and one of those ways is to ship a custom branded authentication app.

Multi-Factor Authentication Best Practices

Two-factor authentication (2FA), also known as multi-factor authentication (MFA), comes in many flavors. But not all are created equal. Best practices should involve at least two selections from this list: FIDO U2F hardware keys, one-time passwords (OTP), and recovery codes.

Articles from sites I follow

Every unsandboxed app has Full Disk Access if Terminal does

When System Integrity Protection (SIP) is enabled, as it is by default, macOS restricts apps from accessing certain files and …

via The Desolation of Blog 22 September 2022

How I’m a Productive Programmer With a Memory of a Fruit Fly

A love letter to tools that changed everything for me.

via Hynek Schlawack 19 September 2022

Mailbag #2

We have a whole lot to talk about. The post Mailbag #2 appeared first on Wait But Why.

via Wait But Why 14 April 2021