this group. Location: Authentication based on geographical areas derived from internet protocol addresses. This may sound cumbersome, but it is not, as multi-factor authentication has been in use for years: [...] factors required for MFA. A real-life example: You frequently order from Amazon. You use an e-mail address and a password for authorization. MFA is not used. By chance, you receive an e-mail asking you to [...] password function on Amazon and gain access to all services where you are logged in with your e-mail address. You can use one or more factors to protect your accounts against identity theft. 3. which methods