Backup Codes for Two-Factor Authentication
What backup codes are, how to use them, and how to regenerate them if you run out or they're compromised.
3 min read
What backup codes are, how to use them, and how to regenerate them if you run out or they're compromised.
Technical explanation of the client-side encryption model used for secure notes — PBKDF2 key derivation and AES-256-GCM.
How to manage, rotate, and revoke personal API tokens used for the Krokanti Notes REST API and MCP integration.