Yeah, it’s fantastic. Some other work — Jeremy alluded to this — beyond user authentication, we’re doing work on identity verification. The recovery process remains a potential back door for social engineers, so we want to find ways to match our commitment to possession based authentication with possession based onboarding and recovery.

Keyboard shortcuts

j previous speech k next speech