Intentionally Inconvenient

22 - Privacy Bootcamp - Level 1 - 2FA and MFA using Hardware Keys


Listen Later

In this episode, Tim Jensen explores the importance of two-factor authentication (2FA) and multi-factor authentication (MFA) using hardware keys to enhance online security. He explains the concepts behind these authentication methods, their role in establishing identity trust, and how they form part of a robust privacy framework. Tim also highlights the advantages of using hardware keys like YubiKey and OnlyKey over other forms of authentication.

Standout Quotes

"Two-factor authentication establishes trust with someone who does not know who you are by using something from a trusted authority as proof of your identity." – Tim Jensen

"Convenience is the enemy of privacy." – Tim Jensen

"Hardware keys need to be physically with you, so that's the best kind because they can't be stolen through hacking." – Tim Jensen

"Always buy two hardware keys. Never buy just one." – Tim Jensen

Key Takeaways

1. What is Two-Factor Authentication?

○ A method requiring two distinct forms of identification to access an account.

○ Common types include: something you know (password), something you have (hardware key), and something you are (biometric data).

2. Why Use Hardware Keys for Authentication?

○ They provide an extra layer of physical security.

○ Cannot be duplicated or stolen digitally.

○ Best for protecting critical accounts like financial or medical records.

3. Tim's Hardware Key Recommendations:

○ YubiKey: Supports USB-C, NFC, and stores authentication codes.

○ OnlyKey: Combines password management with authentication, supporting up to 24 passwords.

4. Best Practices for Hardware Keys:

○ Register your keys during account setup.

○ Keep backup keys in a secure, separate location (e.g., a safe or safety deposit box).

○ Separate storage for passwords and two-factor authentication codes.

5. Layering Your Security:

○ Combine hardware keys with other methods like VPNs and unique email aliases.

○ Use hardware keys alongside password managers for the most secure setup.

Episode Timeline

● [00:00] Introduction: Recap of email aliasing and the importance of layered security.

● [03:00] Explanation of two-factor and multi-factor authentication.

● [10:15] Why hardware keys are the most secure method.

● [18:45] Demonstration of YubiKey and OnlyKey features.

● [24:00] Practical steps to secure your accounts with hardware keys.

● [29:45] Closing thoughts: "Stay safe and stay private."

Resources Mentioned

http://goclik.me/deleteme - A service recommended by Tim Jensen to remove personal information from the internet. They offer a 25% discount.

yubikey.com - Website for purchasing YubiKey hardware security keys

onlykey.io - Website for purchasing Onlykey password manager devices

Contact and Additional Information

Host: Tim Jensen Email: [email protected] Website: Intentionally Inconvenient Podcast

...more
View all episodesView all episodes
Download on the App Store

Intentionally InconvenientBy Tim Jensen