Text
Security, privacy and user interaction
Table of Contents
Part I Considering the Typical User
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
Permissions and Privacy
Privacy and Tracking
Part II Considering the Malicious User
A Framework for Analysis Attackers’ Accounts
Environmentally and Politically Conscious Crypto
Part III Designing Solutions Based on Typical and Malicious Users
Social Engineering Resistant 2FA
The Rising Threat of Launchpad Attacks
Discouraging Counterfeiting
Seeing the Future
No other version available