Two-factor authentication: Difference between revisions

Content deleted Content added
Mobile phone two-factor authentication: Account recovery typically bypasses mobile phone two-factor authentication.; reference
m Fixed deprecated parameters
Line 35:
* Text messages may not be delivered instantly, adding additional delays to the authentication process.
* Account recovery typically bypasses mobile phone two-factor authentication.
<ref name="">{{cite web | lastlast1 = Rosenblatt | firstfirst1 = Seth |last2= coauthorsCipriani |first2= Jason Cipriani | title =Two-factor authentication: What you need to know (FAQ) | publisher =CNET | date =June 15, 2015 | url =http://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/ | accessdate = 2016-03-17}}</ref>
* Modern smart phones are used both for browsing email and for receiving SMS. Email is usually always logged in. So if the phone is lost or stolen, all accounts for which the email is the key can be hacked as the phone can receive the second factor. So smart phones combine the two factors into one factor.
* Mobile phones can be stolen, potentially allowing the thief to gain access into the user's accounts