• SGforce@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    This requires all authentication codes to be sent to the attacker in the first place. Why wouldn’t they just put the code in themselves at that point?