Spam and phishing

What it does

Verifies the person who called you, is authentic.

Challenges I ran into

Accomplishments that I'm proud of

Creating the simple solution.

What I learned

There are multiple secondary ways to authenticate.

What's next for Two Party Authentication

Create interest from industry and regulators or politicians to implement this into business compliance models.

Share this project: