It would be nice if you went into further explanation on how hackers are hacking both streams of communications on two factor authentication. For instance is the hacker a local area hacker or one overseas and if so how can they intercept Local cell tower communications over the Internet when it is a completely different channel of communication? You’ll probably have to give a whole other video with graphics etc. to explain this one as it seems to be a quite complicated process.
It would be nice if you went into further explanation on how hackers are hacking both streams of communications on two factor authentication. For instance is the hacker a local area hacker or one overseas and if so how can they intercept Local cell tower communications over the Internet when it is a completely different channel of communication? You’ll probably have to give a whole other video with graphics etc. to explain this one as it seems to be a quite complicated process.
why do companies seem to assume everyone has a cell phone for 2fa?
I appreciate that not everyone does. You should watch my other video about Yubikeys…. These are great if you don’t have a cell phone
Is it different for a lap top? A company offered either SMS or email two way authentication.
Email is better then SMS
@@bearded365guy I thought so, thank you!