![]() ![]() One thing to take note is that web sites require "mobile" numbers not "landline" numbers, but I have found that if you put the landline-based Google Voice number in and identify it as a mobile number, most web sites will send texts to GV for 2FA. This is a privacy issue, not a security issue, so long as this account is only used for 2FA. Of course, Google can link this second account to my first account using my mobile number or my IP address or my location derived from their location technology using GPS and Wi-Fi. I only use Google on this Chromium browser and never logon to my main Google account there. I think it might work if I setup a new Google account on an alternate browser (Chromium instead of my main Firefox browser). Google has strong security and backup codes. What about Google Voice? Google Voice runs on your phone or your laptop via a web browser. I think this is the best option.īut if your sensitive web site doesn't support Authy or GAuth, you need to use texting or calling to a phone number. If I lose my phone, even unlocked, no bad guy can access Authy without my four-digit PIN and I have access to Authy on my laptop until I get a new phone. I have Authy on my Android phone with a backup vault on my Debian-based laptop. Because Google Authenticator has no backup or second device option and doesn't provide any password protection on the app when running, I prefer Authy. ![]() Use an authenticator app on your phone if the web site supports it. Is a mobile phone number sufficiently secure for use for 2FA? Is Google Voice better? You can also lose your phone physically, you can accidentally destroy it, or you might lose it in a SIM-swapping attack. He transferred his mobile number to a new phone with nothing more than this PIN. ![]() Steve really put a fright in me with his latest podcast end segment where he basically said your mobile number security hangs by a thin thread of a four-digit PIN. (You may permanently close this reminder with the 'X' in the upper right.) And please do not hesitate to ask questions – nowhere else can better answers be found. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. You may click on the image to the right to obtain your own copy of BootAble. The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way. GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. In order to run SpinRite it must first be possible to boot FreeDOS. To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |