Hi there,
On Wed, 4 Jun 2014, Nick Jenkins wrote:
... I recently turned on Google 2-step authentication
... (i.e. something you know + something you have).
...
you can mark a browser as trusted after the first successful
login, and thereafter you only need your password ...
Can you explain how the first part ("something you know + something
you have") is not defeated by the last part? Can the attacker not
simply impersonate your browser having first sniffed your password?
(And why involve a browser anyway? You did mean 'browser'?)
--
73,
Ged.
_______________________________________________
evolution-list mailing list
[email protected]
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list