loader from loading.io

08 - All About 2FA-MFA

Intentionally Inconvenient

Release Date: 03/27/2024

24 - Privacy Bootcamp - Level 1 - Social Media Accounts show art 24 - Privacy Bootcamp - Level 1 - Social Media Accounts

Intentionally Inconvenient

In this episode of the Privacy Bootcamp podcast, we dive into securing your social media accounts, focusing on Facebook and X.com (formerly Twitter). Tim Jensen, host of "Intentionally Inconvenient," walks us through essential settings and strategies to enhance your privacy and protect personal information. From managing your Facebook profile visibility to understanding session tokens on X.com, this episode is packed with actionable insights to keep your digital presence secure. Standout Quotes: •              “Your public...

info_outline
23 - Privacy Bootcamp - Level 1 - 2FA and MFA using Authenticator Applications show art 23 - Privacy Bootcamp - Level 1 - 2FA and MFA using Authenticator Applications

Intentionally Inconvenient

In this episode of the Privacy Bootcamp podcast, we welcome Tim Jensen, the host of "Intentionally Inconvenient," where he explores personal freedom through privacy. Today, Tim delves into two-factor authentication (2FA) and multi-factor authentication (MFA), focusing on authenticator apps and other methods to secure your online accounts. Learn about the tools and strategies that can protect you from hackers and enhance your digital security. Standout Quotes: ●     “In today’s online world, you absolutely must implement 2FA and MFA to move you from the low-hanging...

info_outline
22 - Privacy Bootcamp - Level 1 - 2FA and MFA using Hardware Keys show art 22 - Privacy Bootcamp - Level 1 - 2FA and MFA using Hardware Keys

Intentionally Inconvenient

In this episode, Tim Jensen explores the importance of two-factor authentication (2FA) and multi-factor authentication (MFA) using hardware keys to enhance online security. He explains the concepts behind these authentication methods, their role in establishing identity trust, and how they form part of a robust privacy framework. Tim also highlights the advantages of using hardware keys like YubiKey and OnlyKey over other forms of authentication. Standout Quotes ●     “Two-factor authentication establishes trust with someone who does not know who you are by using...

info_outline
21 Privacy Bootcamp Level 1 Email Aliasing show art 21 Privacy Bootcamp Level 1 Email Aliasing

Intentionally Inconvenient

In this episode, Tim Jensen dives into the importance of email aliasing as a foundational step in maintaining privacy and protecting your digital identity. He shares practical strategies to safeguard your accounts, minimize exposure to hackers, and build a layered security system. Tim emphasizes creating habits of privacy and introduces tools like Proton Pass, SimpleLogin, and YubiKey to simplify the process. Standout Quotes ●     “Using the same email address and the same password for everything is a horrible strategy.” – Tim Jensen ●    ...

info_outline
20 Privacy Bootcamp Level 1 Search Engines show art 20 Privacy Bootcamp Level 1 Search Engines

Intentionally Inconvenient

Tim dives into the privacy implications of search engines, discussing alternatives like Startpage, DuckDuckGo, and Freespoke. He explains how search data can be used to build detailed profiles and why it’s essential to choose search engines that prioritize user privacy. Standout Quotes: ●     "Your search engine knows more about you than your closest friends." ●     "If you like Google’s results but want privacy, Startpage is your best bet." ●     "Support search engines that build from scratch—don’t rely on...

info_outline
19   Privacy Bootcamp  Level 1 Browsers show art 19 Privacy Bootcamp Level 1 Browsers

Intentionally Inconvenient

In this episode, Tim Jensen discusses web browsers and how they impact your privacy. He explains how browsers like Brave, Firefox, and Tor can protect against tracking and surveillance. Tim also highlights the dangers of using mainstream browsers like Google Chrome and Microsoft Edge, emphasizing the need for privacy-focused alternatives. Standout Quotes: ●     "Brave gives you privacy right out of the box—no need to harden it like Firefox." ●     "Every keystroke, every click, every mouse movement is tracked by mainstream browsers." ...

info_outline
18   Privacy Bootcamp   Level 1   Messengers AKA Instant Messengers show art 18 Privacy Bootcamp Level 1 Messengers AKA Instant Messengers

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen explores the world of messengers, dissecting the pros and cons of popular platforms like WhatsApp, Facebook Messenger, iMessage, and others. Tim delves into the importance of end-to-end encryption, decentralization, and other privacy features while explaining why he prefers Signal Messenger over alternatives. He also highlights the critical concept of disappearing messages and why they are a game-changer for protecting privacy. Standout Quotes: ●     "End-to-end encryption means...

info_outline
17   Privacy Bootcamp   Level 1   Virtual Private Networks VPN show art 17 Privacy Bootcamp Level 1 Virtual Private Networks VPN

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen explores the crucial role of virtual private networks (VPNs) in safeguarding online privacy. He clarifies how VPNs work to hide your IP address, showing their necessity in defending personal data from ISPs, cybercriminals, and unauthorized access. Tim provides tips on choosing an effective VPN, dispels misconceptions about digital anonymity, and features the significance of managing one's online identity. He invites the audience to embrace VPNs as an essential part of their approach to maintaining...

info_outline
16   Privacy Bootcamp   Level 1   Passwords and Password Managers show art 16 Privacy Bootcamp Level 1 Passwords and Password Managers

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen addresses the critical issue of password security, introducing listeners to essential tools like complex passwords, password managers, and OnlyKey. He walks through how each tool functions, why they are crucial for safeguarding personal data, and shares practical tips for integrating them into your daily routine. Tim encourages listeners to consider the broader implications of digital security and prepares them to take proactive steps in the ever-evolving battleground of online privacy. Standout Quotes: ...

info_outline
15 - Privacy Bootcamp - Level 1 - Credit Bureaus v1 show art 15 - Privacy Bootcamp - Level 1 - Credit Bureaus v1

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen tackles the ever-present threat of identity theft, introducing listeners to three essential tools for safeguarding privacy: fraud alerts, credit freezes, and credit locks. He explains how these measures work, why they’re vital, and offers step-by-step guidance for implementing them effectively. But reclaiming your privacy doesn’t stop with credit bureaus—Tim also teases future episodes dedicated to tackling broader security challenges. Standout Quotes: “You can always reclaim your privacy. You just...

info_outline
 
More Episodes

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information.

Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more!

Standout Quotes:

  • “Two-factor or multi-factor authentication has prevented the loss of my social media accounts, which in and of itself may not be a big deal. But there's so much personal information that we put in our social media accounts that it can leave us very vulnerable. It could have left me very vulnerable had they taken those accounts over.”
  • “The more layers a hacker has to go through, the more difficult it is for them to hack into your account. They're going to go after the low-hanging fruit, so they are going to pass you by because they'll see that second factor or that third factor.
  • “Always have two or more options for two-factor authentication and multi-factor authentication. If you don't, you could be locked out of your account.”

Key Takeaways:

  • Two-factor authentication is important for securing online accounts and preventing hackers from taking over your accounts.
  • Multi-factor authentication has been used for a long time, such as with credit card transactions; people just do not realize it.
  • Hardware-based authentication like YubiKeys is among the most secure second-factor options.
  • Avoid SMS-based authentication due to SIM swap vulnerabilities.
    Use reputable authenticator apps from trusted providers and enable biometric login if available.
  • Set up multi-factor authentication on multiple devices for redundancy.
  • Session tokens can be stolen, so always log out of accounts when finished.
  • Keep second factors separate from password managers for added security.
  • Have at least two different second-factor options available as backups.
  • Using layers of security through multiple authentication factors makes accounts more secure.

Episode Timeline:

[00:18] Two-factor or Multifactor authentication
[01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication
[03:28] First Factor of Security
[04:45] Various Kinds of Second Factor Authentication
[06:47] Passkeys
[08:02] Importance of having Layers of Privacy
[09:00] Vulnerabilities of using SMS and Email in Authentication
[10:45] Push Factor
[11:33] Biometrics
[12:40] Authenticator Application
[15:48] Hackers bypassing Security using Session Tokens
[21:58] Fake Authenticator Apps 
[22:19] Separate 2FA from Password Managers

 

For more information, please visit http://www.intentionallyinconvenient.com