Thank you for your valued opinion, Zack, and what you added to Marko's 
also-valued information.  Please explain the statement you made that 
setting up 2-step verif. on only that one computer "will make the change 
transparent to them" [the other two fixed computers].

On Saturday, July 18, 2015 at 5:25:11 AM UTC-7, Zack Tennant wrote:
>
> Diane,
>
> WiFi, even the most secure, is extremely hackable.  Even using the one you 
> set up at home, with your own keys, you can *can* have your equipment 
> tricked into revealing sensitive information.  If you're going out in 
> public, like Starbucks, and  using wifi, this risk goes up significantly.  
> I'm a network engineer and I can tell you that your providers are always 
> doing everything we can to protect you from malicious people, and, quite 
> frankly, yourself.  This doesn't mean you should just trust the status 
> quo.  If you feel there are reasonable measures you can take to improve 
> your security, then I would suggest you do them.
>
> To Marko's point... you can set it up so that your two fixed computers, 
> that never move, and are not using WiFi, can bypass the 2-step.  This will 
> make the change transparent to them, and only impact you when you're using 
> the third one, or a public one.
>
>
> On Fri, Jul 17, 2015 at 9:18 PM, DEP/Dodo <[email protected] <javascript:>
> > wrote:
>
>> Marko, your response is precisely what I wanted to know.  I was thinking 
>> about 2-step verification for our three computers here at home, but I feel 
>> they are "reasonably secure" as you do yours.  I rarely use someone else's 
>> computer; rather I am more likely to take with me and use my smallest 
>> computer in a wi-fi setting.  Clearly, under those circumstances (using 
>> another's computer or wi-fi), it would make sense to set up 2-step verif. 
>>
>> Now I'm going to ask for your (and anyone else's) opinion.  For that one 
>> computer that I *occasionally* take with me to use elsewhere via wi-fi 
>> and on which I have had no problems, would I be foolish to go with the 
>> adage "If it ain't broke, don't fix it" and stay with the status quo?
>>
>> With thanks,
>> *~Diane*
>>
>>
>> Earlier, Diane asked if fellow Gmail users use the 2-Step Verification 
>> process.  I do not, because I access my Gmail only from computers that I 
>> know are reasonably secure.  On the other hand, if I used someone else's 
>> computer, or an unknown computer in a library or an Internet cafe, then I 
>> would want to use the 2-Step process.  That is the kind of situation it was 
>> designed for.
>>
>>>
>>> ​I know many users who only use Gmail on one single computer. They do 
>> however manage to regularly get infected with spyware, malware etc. etc.
>> ​  
>> This is also the kind of user that will benefit from 2-Step. ​
>>>
>>> -- 
>>>
>> Marko
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Gmail-Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/gmail-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to