Hacker News new | past | comments | ask | show | jobs | submit login

How would this differ from using an SSH key? Don't we do this all the time? Given prior authorization to add the factor, it is afterwards used on its own to authenticate.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: