Intro to 2FA, What is it, How does it work
First published at 04:42 UTC on October 13th, 2020.
MORE
Category | Vlogging |
Sensitivity | Normal - Content that is suitable for ages 16 and over |
DISCUSS THIS VIDEO
An error has occurred whilst processing your request!
If the issue persists, then please contact us at [email protected].
This advertisement has been selected by the video's creator, .
This advertisement has been selected by BitChute. Displaying these adverts helps support the growth and sustainability of the platform.
This advertisement has been sourced through third-party advertising partners on behalf of BitChute. Displaying these adverts helps support the growth and sustainability of the platform.
For more information on how BitChute processes your data, and to learn how to opt out of advertising, see our Privacy Policy.
Click to copy, then share by pasting into your messages, comments, social media posts and websites.
Click to copy, then add into your webpages so users can view and engage with this video from your site.
We also accept reports via email. Please see the Guidelines Enforcement Process for instructions on how to make a request via email.
We will investigate and take the appropriate action.
Original Upload date: 2018-05-25 10:05:09.000
Never harass or contact anyone in any video I make. Just because someone is being silly doesn't mean they aren't a human being.
Sources;
1 https://www.theguardian.com/technology/2014/jan/22/your-password-is-easy-to-crack
2 https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/\n3 https://passwordsgenerator.net/
4 http://www.hackingarticles.in/hack-gmail-and-facebook-of-remote-pc-using-dns-spoofing-and-set-toolkit/
5 http://eltoma-it.com/2016/09/29/dns-spoofing-how-to-prevent-an-attack/
6 https://www.cnet.com/news/rsa-cyberattack-could-put-customers-at-risk/
7 https://blog.centrify.com/2fa-mfa-difference/
8 https://en.wikipedia.org/wiki/Multi-factor_authentication
9 https://arstechnica.com/information-technology/2011/06/rsa-finally-comes-clean-securid-is-compromised/
10 https://security.stackexchange.com/questions/47901/how-does-authys-2fa-work-if-it-doesnt-connect-to-the-server
11 https://security.stackexchange.com/questions/41939/two-step-vs-two-factor-authentication-is-there-a-difference
12 https://www.cnet.com/how-to/why-you-are-at-risk-if-you-use-sms-for-two-step-verification/
13 https://lifehacker.com/the-difference-between-two-factor-and-two-step-authenti-1787159870
14 https://www.youtube.com/watch?v=caVEiitI2vg
15 https://medium.com/internet-creators-guild/getting-hacked-as-an-internet-creator-982d03637e86
16 https://www.csoonline.com/article/2124681/social-engineering/what-is-social-engineering.html
17 https://xkcd.com/936/
Category | Vlogging |
Sensitivity | Normal - Content that is suitable for ages 16 and over |
Let's do a little New Years Stream!
1 year, 3 months ago
Encrypt your DNS traffic with DNS over TLS
1 year, 4 months ago
4Chan is Trolling Reddit with AI Bait Threads
1 year, 4 months ago
1 year, 5 months ago
Reacting to Lauren Southern's Tell-All on the 2016-era Dissident Right
1 year, 5 months ago
To dismiss this warning and continue to watch the video please click on the button below.
Note - Autoplay has been disabled for this video.