Go beyond ineffective personal identification methods and start confirming identities with confidence
Social Engineering 2.0: Deepfake

Explaining how TOTP is useful in verifying identities in human-to-human interactions

Help fund our work with a donation!
If you like our work, please follow our Twitter account, and consider a small donation to help support continued development of security and privacy related products.
