Content deleted Content added
Tags: Mobile edit Mobile web edit |
m Undid revision 722565576 by 174.119.121.9 (talk) - edit inserted bag drammar |
||
Line 20:
The major drawback of authentication performed using something that the user possesses and one other factor is that the plastic token used (the USB stick, the bank card, the key or similar) must be carried around by the user at all times. And if this is stolen or lost, or if the user simply does not have it with him or her, access is impossible. There are also costs involved in procuring and subsequently replacing tokens of this kind. In addition, there are inherent conflicts and unavoidable [http://eprint.iacr.org/2014/135.pdf trade-offs] between usability and security.
Mobile phone two-factor authentication was developed to provide an alternative method that would avoid such issues. This approach uses mobile devices such as mobile phones and smartphones to serve as "something that the user possesses". If users
Security of the mobile-delivered security tokens fully depends on the mobile operator's operational security and can be easily breached by wiretapping or [[SIM cloning|SIM-cloning]] by national security agencies.<ref>{{Cite web|url=https://www.bellingcat.com/news/2016/04/30/russia-telegram-hack/|title=How Russia Works on Intercepting Messaging Apps - bellingcat|date=2016-04-30|website=bellingcat|language=en-US|access-date=2016-04-30}}</ref>
|