grabs golf club
grabs golf club
That’s why I start my dangerous queries with a broken first word like ELETE FROM table...
and do a proofread before adding the D. Saves you from annoying mistakes either by stupidity or fat fingering the enter key.
Wow, we gone full circle here. 2FA (the “protocol”, not the application mentioned in the OP) was conceived to increase security by requiring a second factor (not second secret). So we would need the password (knowledge based authentication) and the code generating hardware (possession based authentication). If we stuff all our 2FA secrets into a web service, we efficiently removed the possession factor of the authentication, making it one where two knowledge factors (password for the thing you want to login to and password for the hosted 2FA storage) are sufficient.
Wikipedia defines it as
Now if you replace some words you see how absolutely bonkers the idea in general is: