nsfmc’s avatarnsfmc’s Twitter Archive—№ 6,681

  1. …in reply to @ShriramKMurthi
    ShriramKMurthi everyone's threat model is different, but authy and fidokeys make lost phones, upgrades, and recovering from backups way more predictable in my experience