blog

git clone https://git.ce9e.org/blog.git

commit
cd2cdb0ba04c40ea99de0b754a5bb8096bb2cc4d
parent
e45a5340a9e73ed1d8cb1ae16721596ae3660fc1
Author
Tobias Bengfort <tobias.bengfort@posteo.de>
Date
2023-10-15 13:39
mfa: tweak statement on TPMs

Diffstat

M _content/posts/2023-09-28-mfa/index.md 4 ++--

1 files changed, 2 insertions, 2 deletions


diff --git a/_content/posts/2023-09-28-mfa/index.md b/_content/posts/2023-09-28-mfa/index.md

@@ -64,8 +64,8 @@ warnings ("login from new device"). So I am not a fan.
   64    64 More involved implementations use something like a trusted platform module
   65    65 (TPM) where a secret is stored but can never be extracted. This way knowledge
   66    66 of the secret is replaced by possession of the TPM. This is an interesting
   67    -1 theoretical idea, but I am not 100% convinced that this actually works in
   68    -1 practice.
   -1    67 theoretical idea, but as far as I know, real-world TPMs are not perfect. Still,
   -1    68 they pose a considerable obstacle for attackers.
   69    69 
   70    70 # Multi Factor Authentication (MFA)
   71    71