Spam and phishing
What it does
Verifies the person who called you, is authentic.
Challenges I ran into
Accomplishments that I'm proud of
Creating the simple solution.
What I learned
There are multiple secondary ways to authenticate.
What's next for Two Party Authentication
Create interest from industry and regulators or politicians to implement this into business compliance models.
Log in or sign up for Devpost to join the conversation.