Authentication and Two-Factor Authentication

Going beyond passwords to prove you are who you claim to be.

What Is Authentication

Authentication is proving your identity. There are three factors:

FactorWhat It IsExample
Something you knowKnowledgePassword, PIN, security question
Something you havePossessionPhone, security key, smart card
Something you areBiometricFingerprint, face, iris

Two-factor authentication (2FA) requires two different factors. Multi-factor authentication (MFA) requires two or more.

Why Passwords Alone Aren't Enough

ProblemHow 2FA Helps
Password stolen in breachAttacker still needs second factor
Password guessedSecond factor blocks access
Phishing captures passwordWithout second factor, login fails
Keylogger records passwordCan't capture hardware token
Shoulder surfingSecond factor changes constantly

Key insight: 2FA means stealing your password isn't enough.

Types of Two-Factor Authentication

Ranking by Security

TypeSecurityConvenienceRecommendation
Hardware security keyExcellentModerateBest choice for critical accounts
Authenticator appVery goodGoodGreat for most accounts
Push notificationGoodExcellentGood balance
SMS/Text messageFairExcellentBetter than nothing
Email codePoorGoodAvoid if possible

Hardware Security Keys

Physical devices that plug into your computer or tap on your phone.

KeyPriceConnectionNotes
YubiKey 5 NFC$50USB-A + NFCMost popular
YubiKey 5C$55USB-CFor newer devices
Google Titan$30-35USB + NFC/BluetoothGood value
Solo Keys$25-40USB-A or USB-COpen source

Best practices for hardware keys:

DoDon't
Buy two keys (backup)Rely on single key
Register both on all accountsLose track of which accounts use it
Store backup key securelyKeep both keys together
Start with most critical accountsTry to do everything at once

Authenticator Apps

Apps that generate time-based one-time passwords (TOTP):

AppPlatformCloud BackupNotes
Google AuthenticatoriOS, AndroidYes (Google account)Simple, widely compatible
Microsoft AuthenticatoriOS, AndroidYes (Microsoft account)Good for Microsoft ecosystem
AuthyiOS, Android, DesktopYes (encrypted)Best backup/sync options
1PasswordAll platformsYes (with subscription)Integrated with password manager
AegisAndroidManual exportOpen source, local only

Setting up authenticator apps:

  1. Account settings > Security > Enable 2FA
  2. Select "Authenticator app" option
  3. Scan QR code with your app
  4. Enter the 6-digit code to verify
  5. Save backup codes in password manager

SMS and Phone-Based 2FA

TypeHow It WorksVulnerability
SMS codeText message with codeSIM swapping, interception
Voice callAutomated call reads codeSIM swapping, voicemail hacking
Push notificationApprove on phonePush fatigue attacks

SMS vulnerabilities:

AttackHow It Works
SIM swappingAttacker convinces carrier to transfer your number
SS7 attacksExploit phone network vulnerabilities
Voicemail hackingAccess codes left as voicemail
InterceptionGovernment or sophisticated attackers

SMS is still better than no 2FA, but use authenticator apps when available.

Account-Specific 2FA Setup

High Priority Accounts

Account TypeRecommended 2FAWhy Critical
Primary emailHardware key or authenticatorGateway to all account recovery
Password managerAuthenticator appProtects all other passwords
Bank/FinancialWhatever they offerDirect financial access
Cloud storageAuthenticator appMay contain sensitive files

Setting Up 2FA on Major Services

ServiceWhere to FindBest Option Available
GoogleSecurity > 2-Step VerificationHardware key, Authenticator
AppleApple ID > Sign-In and SecurityTrusted devices, Hardware key
MicrosoftSecurity > Two-step verificationMicrosoft Authenticator
FacebookSecurity and Login > Two-FactorAuthenticator app
AmazonLogin & Security > Two-StepAuthenticator app
Twitter/XSecurity > Two-factorAuthenticator (not SMS for free)

Backup Codes

When you enable 2FA, most services provide backup codes. These are one-time passwords for when you can't use your normal 2FA method.

Managing Backup Codes

DoDon't
Save in password managerScreenshot on phone
Print and store securelyEmail to yourself
Note which ones you've usedForget they exist
Generate new ones periodicallyShare with others

What If You Lose Access to 2FA

SituationSolution
Lost phone with authenticatorUse backup codes
Backup codes also lostContact account support
Hardware key lostUse backup key or backup codes
All methods lostAccount recovery (difficult)

Prevention: Always have multiple recovery methods set up.

Passkeys: The Future of Authentication

Passkeys are a new technology replacing passwords entirely:

FeatureHow It Works
Biometric unlockFace or fingerprint on your device
Device-basedPrivate key stored on your device
Phishing resistantCan't be tricked into fake sites
No password to rememberYour device handles authentication

Current Passkey Support

ServicePasskey Support
GoogleFull support
AppleFull support
MicrosoftFull support
AmazonPartial support
Many banksComing soon

Should You Use Passkeys

SituationRecommendation
Tech-savvy, single ecosystemYes, start using passkeys
Multiple devices, different ecosystemsWait for better cross-platform
Shared accountsNot yet suitable
Confused by the conceptStick with password + 2FA

Common Authentication Mistakes

MistakeWhy It's DangerousBetter Practice
Same 2FA method everywhereSingle point of failureVary methods, have backups
Not saving backup codesLocked out if 2FA failsStore in password manager
Only SMS-based 2FAVulnerable to SIM swapUse authenticator app
Approving unknown push notificationsAttacker gains accessVerify before approving
Sharing 2FA codes with "support"Phishing for full accessNever share codes

Push Notification Fatigue Attacks

Attackers bombard you with authentication prompts hoping you'll approve one:

Attack StepWhat Happens
Attacker has your passwordFrom breach or phishing
Repeated login attemptsYou get many notifications
Exhaustion or accidentYou approve one
Account compromisedAttacker is now logged in

Defense:

DoDon't
Read each notification carefullyApprove reflexively
Check time and locationApprove if you're not logging in
Report suspicious activityIgnore repeated prompts
Consider switching to TOTPIf push fatigue is a risk

Account Recovery Planning

Recovery Method Comparison

MethodSecurityConvenienceRecommended
Backup security keyExcellentModerateYes, for important accounts
Backup codes in vaultVery goodGoodYes, always save these
Recovery email (secured)GoodGoodYes, but secure that email too
Recovery phoneFairExcellentSIM swap risk
Security questionsPoorGoodUse random answers

Creating a Recovery Plan

  1. Primary authentication: Password + authenticator app
  2. First backup: Backup codes in password manager
  3. Second backup: Secondary security key (for key-based auth)
  4. Emergency recovery: Recovery email (also secured with 2FA)

Biometric Authentication

Types and Security

BiometricSecurityConvenienceSpoofing Risk
FingerprintGoodExcellentModerate
Face recognitionGood to excellentExcellentVaries by implementation
Iris scanExcellentModerateLow
VoiceFairGoodHigher with AI

When to Use Biometrics

AppropriateBe Cautious
Device unlockSole authentication method
Confirming purchasesHigh-security requirements
Password manager accessCrossing borders
Convenience layerWhen coercion is possible

Important: Biometrics can be compelled (forced finger on sensor). PINs and passwords require knowledge.

Enterprise vs. Personal Authentication

If you work for an organization:

Personal AccountsWork Accounts
You control 2FA setupCompany policy dictates
Use personal authenticatorMay require specific app
Hardware keys are yoursCompany may provide keys
Backup codes are yoursFollow company procedures

Keep work and personal separate:

DoDon't
Separate authenticator for workMix personal and work 2FA
Follow company security policiesUse personal key for work
Report work account issues to ITTry to fix work accounts yourself

Key Takeaways

  1. Enable 2FA everywhere possible - It's the single most effective security measure
  2. Hardware keys are best - Followed by authenticator apps, then SMS
  3. SMS is better than nothing - Use it if it's the only option
  4. Save backup codes - Store them securely in your password manager
  5. Buy two hardware keys - Register both, store backup securely
  6. Protect your primary email first - It's the key to everything else
  7. Beware push fatigue attacks - Never approve unexpected prompts
  8. Plan for recovery - Multiple backup methods for important accounts
  9. Passkeys are coming - Watch for adoption, start using when ready
  10. Biometrics are convenient, not infallible - Use as one factor, not the only factor