Using an hardware key to protect yourself

• 1 min read

As a follow up of the previous note, here a link about hardware keys as a way to secure login without using a user-generated password, which I remind you, is the 80% cause of access breach.