Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Greetings fellow feline, I am a microbiologist not IT. In that capacity, the only general suggestion is to have redundant authentication measures that cannot all be crippled by one source like this. I can't imagine it's popular, or easy, for a company to want to be able to use multiple authentication schemes, but this sort of situation shows why lock-in is a bad idea.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: