Skip to main content




β™² @dianea@diasporasocial.net:
"The implied attack assumes that MFA is not used or has been bypassed. If you can get access to download the encrypted database, like what happens with most password databases that are stolen, you don’t need to deal with MFA (or those pesky password lockouts) when making attempts thereafter."
hivesystems.com/blog/are-your-…



⇧