tag:blogger.com,1999:blog-543632894130175779.post6340468526606294103..comments2024-01-18T05:53:14.361-05:00Comments on TechTopics4U: More Secure Than Your PasswordDavid Schuchmanhttp://www.blogger.com/profile/08634504769996385896noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-543632894130175779.post-50672542256278702302014-11-17T08:34:54.684-05:002014-11-17T08:34:54.684-05:00The common idea behind those approaches is to secu...The common idea behind those approaches is to secure access with "something you have AND something you know". I would differentiate wearable security which often relies on RFID and the 2 step authentification (as used by Google). 2 step relies on a secure channel which may or may not be accessed via a mobile device. Ghttps://www.blogger.com/profile/06239372877386507844noreply@blogger.com