5/31/2023 0 Comments Fido key googleThe USB devices communicate with the host computer using the human interface device (HID) protocol, essentially mimicking a keyboard. Therefore, for services that do not provide any alternate account recovery method, the use of U2F should be carefully considered. If a hardware duplicate or alternate hardware key is not kept and the original U2F hardware key is lost, no recovery of the key is possible (because the private key exists only in hardware). In terms of disadvantages, one significant difference and potential drawback to be considered regarding hardware-based U2F solutions is that unlike with TOTP shared secret methods, there is no possibility of "backing up" of recovery codes or shared secrets.
0 Comments
Leave a Reply. |