Ben Tasker
@bentasker
@BlueBird1827 @TwitterSupport but as a second factor it's fine. But then there are lots of attempts to remove the first factor and just use a dongle etc, which is all well and good but you get back to "and if it's stolen?" meaning compromise
10 Oct 2019 10:27
2019 Archive