Anyone that sets themselves up to be a single point of failure like this will be a target. And here we are, with hackers now able to make authentic-looking police requests for data.
Something that caught my eye in these screenshots: they include Authy, Twilio's 2-factor authentication app. #Technology
[Link]
·
Links
·
Share this post
Werd I/O © Ben Werdmuller. The text (without images) of this site is licensed under CC BY-NC-SA 4.0.
I’m writing about the intersection of the internet, media, and society. Sign up to my newsletter to receive every post and a weekly digest of the most important stories from around the web.