Andrew Hall

Results 3 comments of Andrew Hall

There are other examples of data that require root (sensor info) no?

Chiming in cuz I want this feature and disagree with the above comment about the value of 2FA. 2FA in practice primarily guards against password stuffing/replay attacks. This is still...

In what scenario do you own the machine and not be able to log input and network traffic and capture session keys? You may not be able to reliably reproduce...