This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||
|
tw factor dubious
editI'm inclined to remove the sentences about two-factor authentication using a secret offset. It seems of dubious value as an attacker who has the code sheet can figure out the offset by listening to an authentication exchange or two. Any reference that this is done in practice?--agr (talk) 12:14, 8 March 2013 (UTC)