In this episode of the Privacy Bootcamp podcast, we welcome Tim Jensen, the host of "Intentionally Inconvenient," where he explores personal freedom through privacy. Today, Tim delves into two-factor authentication (2FA) and multi-factor authentication (MFA), focusing on authenticator apps and other methods to secure your online accounts. Learn about the tools and strategies that can protect you from hackers and enhance your digital security.
Standout Quotes:
● “In today’s online world, you absolutely must implement 2FA and MFA to move you from the low-hanging fruit to the top-of-the-tree hanging fruit.” – Tim
● “Convenience is the enemy of privacy.” – Tim
● “Always log out when you're done with your session. It’s the most inconvenient thing, but it’s also the most secure.” – Tim
● “Your authenticator app does not need to be connected to the internet to generate codes.” – Tim
Key Takeaways:
● Importance of 2FA and MFA: These tools add an extra layer of security to your online accounts, making it harder for hackers to gain access.
● Types of Algorithms: Various algorithms like time-based one-time passwords (TOTP) and HMAC-based one-time passwords ensure the secure generation and verification of authentication codes.
● Authenticator Apps: Recommended apps include YubiKey and GSA Authenticator, which allow you to generate secure 2FA codes and transfer data between devices.
● Risks of Session Tokens: Always log out after your session to prevent unauthorized access through stolen session tokens.
● Avoid Storing All Credentials Together: Keep your 2FA codes separate from your password manager for enhanced security.
● Offline Functionality: Authenticator apps can generate codes even when offline, making them a reliable option.
● Consider Hardware Keys: Tools like YubiKey are nearly foolproof because they require physical possession to access accounts.
● Biometric Concerns: Biometrics are convenient but can be compromised if accessed by unauthorized entities, including government officials.
Episode Timeline:
● [00:00] Introduction to 2FA and MFA
● [02:15] Types of 2FA: Text, Email, Phone Calls, and Authenticator Apps
● [05:40] How Algorithms Generate 2FA Codes
● [10:30] Recommended Authenticator Apps and Tools
● [15:20] The Importance of Logging Out After Sessions
● [18:45] Risks of Storing Credentials Together
● [21:10] Hardware Keys vs. Authenticator Apps
● [25:00] Final Thoughts on Privacy and Security
Resources Mentioned
● Free Code Camp (https://www.freecodecamp.org/) - Mentioned as a source for more detailed information on authentication algorithms.
● goclik.me/deleteme - A service recommended by Tim Jensen to remove personal information from the internet. They offer a 25% discount.
● My Life (https://www.mylife.com/) - A people search site that can potentially find personal information about an individual.
● Spokeo (https://www.spokeo.com/),
● Whitepages (https://www.whitepages.com/)
● BeenVerified (https://www.beenverified.com/)
● LexisNexis (https://www.lexisnexis.com/) - Other people search sites that can potentially expose personal information.
Contact and Additional Information
Host: Tim Jensen Email: [email protected] Website: Intentionally Inconvenient Podcast