Using an hardware key to protect yourself

20th December, 2019 1 min. read

As a follow up of the previous note, here a link about hardware keys as a way to secure login without using a user-generated password, which I remind you, is the 80% cause of access breach.


Spotted a typo or (likely) a grammar error? Send a pull request.