The original post: /r/cybersecurity by /u/WhenTheRainsCome on 2024-11-07 20:37:58.

I’m updating my understanding and ability to communicate to non-technical folks on WHY hardware keys improve security. There are some classic scenarios like, you can’t read your FIDO2 auth over the phone in a social engineering scenario like you can with an OTP.

I’d like to showcase how phishing-resistant MFA protects against an Attacker in the Middle scenario.

I don’t operate a PhaaS platform, so I’m missing some of the tech details from the TA perspective, how far off base are the scenarios I diagrammed out?

Diagram