Intentionally Inconvenient

08 - All About 2FA-MFA


Listen Later

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information.

Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more!

Standout Quotes:

  • "Two-factor or multi-factor authentication has prevented the loss of my social media accounts, which in and of itself may not be a big deal. But there's so much personal information that we put in our social media accounts that it can leave us very vulnerable. It could have left me very vulnerable had they taken those accounts over."
  • "The more layers a hacker has to go through, the more difficult it is for them to hack into your account. They're going to go after the low-hanging fruit, so they are going to pass you by because they'll see that second factor or that third factor.
  • "Always have two or more options for two-factor authentication and multi-factor authentication. If you don't, you could be locked out of your account."

Key Takeaways:

  • Two-factor authentication is important for securing online accounts and preventing hackers from taking over your accounts.
  • Multi-factor authentication has been used for a long time, such as with credit card transactions; people just do not realize it.
  • Hardware-based authentication like YubiKeys is among the most secure second-factor options.
  • Avoid SMS-based authentication due to SIM swap vulnerabilities. Use reputable authenticator apps from trusted providers and enable biometric login if available.
  • Set up multi-factor authentication on multiple devices for redundancy.
  • Session tokens can be stolen, so always log out of accounts when finished.
  • Keep second factors separate from password managers for added security.
  • Have at least two different second-factor options available as backups.
  • Using layers of security through multiple authentication factors makes accounts more secure.

Episode Timeline:

[00:18] Two-factor or Multifactor authentication [01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication [03:28] First Factor of Security [04:45] Various Kinds of Second Factor Authentication [06:47] Passkeys [08:02] Importance of having Layers of Privacy [09:00] Vulnerabilities of using SMS and Email in Authentication [10:45] Push Factor [11:33] Biometrics [12:40] Authenticator Application [15:48] Hackers bypassing Security using Session Tokens [21:58] Fake Authenticator Apps [22:19] Separate 2FA from Password Managers

For more information, please visit http://www.intentionallyinconvenient.com

...more
View all episodesView all episodes
Download on the App Store

Intentionally InconvenientBy Tim Jensen