Spam and phishing
What it does
Verifies the person who called you, is authentic.
Challenges I ran into
Accomplishments that I'm proud of
Creating the simple solution.
What I learned
There are multiple secondary ways to authenticate.
What's next for Two Party Authentication
Create interest from industry and regulators or politicians to implement this into business compliance models.