Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Thanks for the reply! What's expecting one.

Since you might have you delete the reply anyway, can I get a candid answer on why hardware 2FA tokens weren't a part of the default workflow before the incident? Was it concerns about the cost, the recovery modes, or was it just the trust in the existing approach?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: