26:58 Moritz Horsch The Wide Diversity of Password Requirements And how to cope with it All Hacking Cons
29:19 Christiaan Brand WebAuthn and security keys unlocking the key to authentication All Hacking Cons