All Questions
Tagged with threat-modeling authentication
2 questions
1
vote
1
answer
269
views
Authorization over Internet without storing user details
We have a requirement where we are creating an user generation page over internet for various vendors.
This was earlier done by our operations team on intranet. For each vendor to create a unique ID ...
1
vote
1
answer
1k
views
why gmail's phone verification code not encrypted
while using google's phone verification code system, i have noticed that google phone verification code is always 6 digits
cant it be brute forced for randomly generating the 6 digits?is it there any ...