Quote:
Originally Posted by John F
I'm not sure that is a use case? Let's say they steal my purse. My phone is in my purse. So I go to my computer to log into Find My. But 2-step authentication sends a code to my phone: I'm stuck?
|
...and this is my objection to 2 factor authentication that involves a phone. Lose your phone, lose your access. Whenever possible, I set up the 2 factor to use my email for this very reason.
Shari