--

I don't have a laptop. I stated in the article that I have a desktop computer. I don't have a "smartphone." The counter scenarios you raise are red herrings. Successful cyber attacks exploit access to physical components by using leaked or stolen ***passwords***. 99.9999% of attacks can be thwarted by strong passwords and not falling for e-mail phishing rouses that attempt to steal ***passwords***. Of course, anyone stupid enough to put fintech apps on their "smartphone" is inviting trouble and no amount of 2FA will help them.

--

--

Douglas Giles, PhD
Douglas Giles, PhD

Written by Douglas Giles, PhD

Philosopher by trade & temperament, professor for 21 years, bringing philosophy out of its ivory tower and into everyday life. https://dgilesauthor.com/

Responses (1)