O'Reilly logo

Two-Factor Authentication by Mark Stanislav

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6: TWO FACTOR FOR INTERNET END-USERS

Changing the face of two-factor adopters

As has been noted in this book, many of the people who’ve used two-factor authentication in computing contexts likely did so through their professional careers in a few main industry verticals. Because of this, many of the standards and second-factor technologies we’ve reviewed are foreign even to a seasoned user of two-factor authentication. Until 2008, the average Internet user was very unlikely to have any access to two-factor authentication for their accounts and thus exposure to these technologies will have been limited or non-existent.

From 2011 to present, there’s been a steady increase in the number of online sites and services that provide their end-users ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required