CHAPTER 6: TWO FACTOR FOR INTERNET END-USERS

Changing the face of two-factor adopters

As has been noted in this book, many of the people who’ve used two-factor authentication in computing contexts likely did so through their professional careers in a few main industry verticals. Because of this, many of the standards and second-factor technologies we’ve reviewed are foreign even to a seasoned user of two-factor authentication. Until 2008, the average Internet user was very unlikely to have any access to two-factor authentication for their accounts and thus exposure to these technologies will have been limited or non-existent.

From 2011 to present, there’s been a steady increase in the number of online sites and services that provide their end-users ...

Get Two-Factor Authentication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.