
Sign up to save your podcasts
Or


Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information.
Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more!
Standout Quotes:
Key Takeaways:
Episode Timeline:
[00:18] Two-factor or Multifactor authentication [01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication [03:28] First Factor of Security [04:45] Various Kinds of Second Factor Authentication [06:47] Passkeys [08:02] Importance of having Layers of Privacy [09:00] Vulnerabilities of using SMS and Email in Authentication [10:45] Push Factor [11:33] Biometrics [12:40] Authenticator Application [15:48] Hackers bypassing Security using Session Tokens [21:58] Fake Authenticator Apps [22:19] Separate 2FA from Password Managers
For more information, please visit http://www.intentionallyinconvenient.com
By Tim JensenWelcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information.
Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more!
Standout Quotes:
Key Takeaways:
Episode Timeline:
[00:18] Two-factor or Multifactor authentication [01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication [03:28] First Factor of Security [04:45] Various Kinds of Second Factor Authentication [06:47] Passkeys [08:02] Importance of having Layers of Privacy [09:00] Vulnerabilities of using SMS and Email in Authentication [10:45] Push Factor [11:33] Biometrics [12:40] Authenticator Application [15:48] Hackers bypassing Security using Session Tokens [21:58] Fake Authenticator Apps [22:19] Separate 2FA from Password Managers
For more information, please visit http://www.intentionallyinconvenient.com