Jump to content

Sharis

Members
  • Content Count

    3
  • Joined

  • Last visited

About Sharis

  • Rank
    Newbie
  1. I'm gathering information of how to authenticate offline system. My first intentions was to implement 2FA usb key, but what I have gathered it seems that the best way to authenticate user is by hardware fingerprinting. But I want to know how 2FA usb key can be bypassed and why it's secure.
  2. Hello, everyone, someone has mentioned that 2FA keys for offline systems are useless. I would like to know why and how it could be bypassed easily?
  3. Hello, fellas security people, I would like to know the best way to authenticate offline software. We would like to sell our client our server software, but we want to ensure that this software would not be duplicated or used by non authorized users. We are thinking about usb authentication key, but I want to know how other people think about this problem.
×
×
  • Create New...