Account recovery protocol when email is breached, or inaccessible?
I am creating a web application for individual accounts. The email address is also used as the user name. 2FA is setup for the user to optionally use. I’ve been trying to wrap my head around preparing for account recovery in these couple o… Continue reading Account recovery protocol when email is breached, or inaccessible?