Authentication using visual codes: what can go wrong
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. Can anything be done, and what compromises need to be made to protect users?
Learn more in this PasswordsCon Bergen 2013 presentation by Chris Warrington, Pico project, University of Cambridge.