This draft is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.InternetWikipedia:WikiProject InternetTemplate:WikiProject InternetInternet
This draft is within the scope of WikiProject Organizations, a collaborative effort to improve the coverage of Organizations on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.OrganizationsWikipedia:WikiProject OrganizationsTemplate:WikiProject Organizationsorganization
This draft is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer security
This draft is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
Latest comment: 15 days ago3 comments1 person in discussion
Hi! Just checking in on this draft.
I submitted Draft:2FABypass (2)Two Factor Authentication Bypass a while ago and wanted to see if anyone might be able to take a look. I’ve tried to follow the notability and sourcing guidelines as best I could, and I think it’s close to ready.
Hi everyone! I’ve been working on a draft called Draft:2FABypass (2)Two Factor Authentication Bypass, and it was recently declined. I’ve gone back and cleaned up the citations using the proper templates, and I’ve added more reliable sources like Forbes and Yahoo Finance.
The article is about actual methods and tools used to bypass two-factor authentication in cybersecurity. I’m hoping someone could take a look and let me know if it’s in better shape now, or if there’s anything else I should work on. I’d really appreciate the feedback. Thanks! Letscontributes (talk) 01:46, 15 August 2025 (UTC)Reply