Two-factor authentication: Difference between revisions

Content deleted Content added
rv
HD password scanning is not a failing - it's what you have, not what you know that provides extra security.
Line 9:
A common example of T-FA is a bank card ([[credit card]], [[debit card]]); the card itself is the physical item, and the personal identification number (PIN) is the data that goes with it. See [[Chip and PIN]] for more information on this.
 
According to proponents, T-FA could drastically reduce the incidence of online identity theft, and other online [[fraud]], because the victim's password would no longer be enough to give a thief access to their information. On the other handHowever, opponents argue that, (among other things) should a thief have access to your [[computerBruce Schneier]], heargues can bootT-upFA inis suchstill a way asvulnerable to bypass the physical authentication processes, scan your system for all passwordstrojan and enter the data manually, thus man- at least in this situation - making Tthe-FAmiddle no more secure than the use of a password aloneattacks.
 
== Examples ==