loader from loading.io

08 - All About 2FA-MFA

Intentionally Inconvenient

Release Date: 03/27/2024

11 - STOP the Data Leak, Part 1 show art 11 - STOP the Data Leak, Part 1

Intentionally Inconvenient

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. In this episode, Tim Jensen will talk about the persistent issue of data leaks through apps and services from major tech companies. We will explore the risks associated with health apps, the challenges of intrusive privacy policies, and strategies for enhancing privacy using services like ProtonMail and ProtonVPN. Standout Quotes: "Any account that you create involves data collection. Data is the currency you use to pay for free services." "Data collection is a potential data leak whenever...

info_outline
10 - Email - The Museum Of YOU show art 10 - Email - The Museum Of YOU

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! This episode focuses on discussing email privacy in the digital age and how email can act as a "Museum of You" by storing users' personal data and communications over many years with providers. Tim Jensen explores strategies for taking back control of one's privacy through encrypted email services and better digital security practices.  Standout Quotes: “Privacy is the right to control access to ourselves.” “If the product is free, you are the product.” “Competitive intelligence is how these companies make their money. We need...

info_outline
09 - Enemies of Privacy show art 09 - Enemies of Privacy

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the major enemies of privacy in the digital age. It identifies the biggest tech companies like Google, Meta, Microsoft and Amazon as large collectors of personal data. Tim Jensen gives tips for taking action to improve privacy habits and reduce reliance on major tech companies that extensively collect personal data.  Standout Quotes: “Privacy is not free; it will actually cost you less to pay a little upfront to protect your privacy than if you gave it away, because that's not measured in dollars.” “If...

info_outline
08 - All About 2FA-MFA show art 08 - All About 2FA-MFA

Intentionally Inconvenient

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information. Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online...

info_outline
07 - All About Password Managers show art 07 - All About Password Managers

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the importance of using a password manager to securely store unique, complex passwords for all online accounts. Tim Jensen provides practical tips for improving password security and taking back control of personal data from companies.  Standout Quotes: “Convenience is the enemy of privacy.” “I don't want to be the product, I want to be the person who pays for my software so that when I use it, I know that I'm not having all this information collected on me.” “I don't recommend that you use the browser...

info_outline
06- All About Passwords show art 06- All About Passwords

Intentionally Inconvenient

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. Passwords are the keys to your accounts. It is the defense that keeps your account safe from other people. As such, setting up unique and strong passwords for every account is critical. It could be daunting, but with the right tools, you can do it. Do everything you can to keep you safe online! In this episode, Tim Jensen discusses the importance of using unique, complex passwords for each account and avoiding password reuse. You will learn about password complexity, the use of password...

info_outline
05 - BASIC Principles Of Privacy show art 05 - BASIC Principles Of Privacy

Intentionally Inconvenient

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. By knowing how to limit who has access to our information and questioning why we need to share personal details, we can protect our identity and rights at a time when data collection is expected. In this episode, Tim Jensen will elaborate on the basic principles of individual privacy. We will explore controlling access to oneself, limiting trust to safeguard privacy, refraining from using privacy as an excuse for unlawful actions, and all about the other fundamentals. Standout Quotes: ...

info_outline
04 - The First Things You Need To Do Today To Protect Your Privacy show art 04 - The First Things You Need To Do Today To Protect Your Privacy

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast where we dive deep into personal freedom through the lens of securing your privacy. Privacy isn’t a destination, it’s a journey. This episode, Tim Jensen is going to share five actionable steps you can take right now to kickstart your journey towards greater privacy protection. Standout Quotes: “Privacy is a journey, not a destination. We can take small steps every day to ensure that we are more private than we were yesterday.” “Privacy takes time. It takes effort, and sometimes it can cost you some money.” “You can't change the...

info_outline
03 - Privacy is Like Air show art 03 - Privacy is Like Air

Intentionally Inconvenient

Welcome to Intentionally Inconvenient, where we talk about our freedom by securing our privacy. It's easy to underestimate the significance of safeguarding our digital footprints in today's interconnected age. Still, the truth is, that protecting your privacy begins and ends with you—and it matters now more than ever. In this episode, Tim Jensen will discuss the importance of personal responsibility for privacy and the risks of giving up privacy for perceived security benefits. We will discuss the need to safeguard personal identifying information, challenge the idea of "I have nothing to...

info_outline
02 - Be Careful How You Slice Your Pii show art 02 - Be Careful How You Slice Your Pii

Intentionally Inconvenient

Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the importance of personal privacy and information security in today's world. Tim Jensen leads a discussion on defining privacy as the right to control access to oneself, including one's personal information and physical distance. He expresses concern about how much personal data is publicly available online without consent through data broker websites and believes that everyone has a right to protect this data and control who has access to it.  Standout Quotes: “Privacy is the right to control access to...

info_outline
 
More Episodes

Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information.

Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more!

Standout Quotes:

  • “Two-factor or multi-factor authentication has prevented the loss of my social media accounts, which in and of itself may not be a big deal. But there's so much personal information that we put in our social media accounts that it can leave us very vulnerable. It could have left me very vulnerable had they taken those accounts over.”
  • “The more layers a hacker has to go through, the more difficult it is for them to hack into your account. They're going to go after the low-hanging fruit, so they are going to pass you by because they'll see that second factor or that third factor.
  • “Always have two or more options for two-factor authentication and multi-factor authentication. If you don't, you could be locked out of your account.”

Key Takeaways:

  • Two-factor authentication is important for securing online accounts and preventing hackers from taking over your accounts.
  • Multi-factor authentication has been used for a long time, such as with credit card transactions; people just do not realize it.
  • Hardware-based authentication like YubiKeys is among the most secure second-factor options.
  • Avoid SMS-based authentication due to SIM swap vulnerabilities.
    Use reputable authenticator apps from trusted providers and enable biometric login if available.
  • Set up multi-factor authentication on multiple devices for redundancy.
  • Session tokens can be stolen, so always log out of accounts when finished.
  • Keep second factors separate from password managers for added security.
  • Have at least two different second-factor options available as backups.
  • Using layers of security through multiple authentication factors makes accounts more secure.

Episode Timeline:

[00:18] Two-factor or Multifactor authentication
[01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication
[03:28] First Factor of Security
[04:45] Various Kinds of Second Factor Authentication
[06:47] Passkeys
[08:02] Importance of having Layers of Privacy
[09:00] Vulnerabilities of using SMS and Email in Authentication
[10:45] Push Factor
[11:33] Biometrics
[12:40] Authenticator Application
[15:48] Hackers bypassing Security using Session Tokens
[21:58] Fake Authenticator Apps 
[22:19] Separate 2FA from Password Managers

 

For more information, please visit http://www.intentionallyinconvenient.com