Hey! Wait a minute! That... That looks just like mine!!The Annoyed Man wrote: ↑Mon Dec 13, 2021 11:15 am Mine is so secure, I don’t mind sharing it publicly. It is: ************
![]()
Whenever feasible, for sensitive accounts I always opt to use two-factor authentication. Bit of a pain, but worth it. We even used it as a product from RSA over 15 years ago at a company I worked for. That particular method never caught-on widely, though. We were issued a little key fob manufactured by RSA (in case Andy is reading, not that RSA; RSA Security LLC, now owned by Dell). Each key fob was unique, and every three minutes (I think that was the duration) the fob would display a new numeric code. The code was synched with the RSA servers, so we had to enter our password plus the code to log in; impossible to log in without the key fob.
Today the most common two-factor auth method is to to send you a numeric code via an SMS text message to your cell number on file and have that code expire in a few minutes. You're still hosed if you need to log-on but have lost your phone...or dropped it in the bay that time you lost all your firearms while boating off Galveston.
I had one two-factor account that drove me crazy because they used email to send you the code. And the code expired similarly in just a couple of minutes. But my email of record was a Gmail account that I had set to forward to an email server that I managed, and then I handled the emails from that account in Outlook. So the email had to chain through a series of forwarders. By the time I got the code in Outlook, most of the time it was already expired. They eventually enabled SMS messaging for the code, finally.