It’s potentially as single point of failure _if you have the cell phone_ because then you often get the password too.
But most databreaches aren’t done by people stealing cell phones, it’s just not scalable. 2FA mostly works because most methods of broaching single authentication involve getting just the password by someone who has no hope of getting access to the associated phone.
Latest Answers