Remove tag mobile-app
article thumbnail

Security Keys

Imperial Violet

The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. This often takes the form of an app on the user’s phone (e.g. There are no CTAP2 devices on the market yet but their major distinguishing feature will be that they can be used as a 1 st (and only) factor.

Security 118