Closed Network Privacy Podcast cover image

Episode 11 - Security Tips - Apps I Use - 2FA - TOTP

Closed Network Privacy Podcast

00:00

Security Tips - Security Tips, Security Tips

Sohis figuread: Don't give real information. Always assume, any time you're giving information out, that it's somewhere along the line a, it's going to be accessed,. shared, leaked and sold. Two factor authentication requires usually a use name in pass word, or an email address, and a password, and then a second factor to verify that it's truly you who's trying to access the account. T o t p is time based, one time password. If you're loging into your bank, oftentimes they'll send you a text message. That's the weakest form of two factor authentication.

Play episode from 10:16
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app