2FA: Two Factor Authentication - Computerphile

  Рет қаралды 500,497

Computerphile

Computerphile

6 жыл бұрын

Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor authentication.
Password Cracking: • Password Cracking - Co...
The End of Time (Unix Time) - Numberphile: • End of Time (Unix) - N...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Пікірлер: 371
@Pyrazahn
@Pyrazahn 6 жыл бұрын
2 factor authentification: combine a thing you can forget with a thing you can lose.
@conceitedxo
@conceitedxo 4 жыл бұрын
@MadYellowAsian especially when you really try not to lose something you lose it
@boruut2909
@boruut2909 4 жыл бұрын
I hope no one has put dementia on my schedule.
@AlexTechie
@AlexTechie 4 жыл бұрын
@MadYellowAsian What if I forget not to lose it?
@brianwilliams8455
@brianwilliams8455 4 жыл бұрын
You have nothing worthy enough of value to have this mindset
@TrickyBoa
@TrickyBoa 4 жыл бұрын
Boruut this comment is under appreciated lol
@YingwuUsagiri
@YingwuUsagiri 6 жыл бұрын
Mike Pound and Brailsford are two of the people I can listen to ad infinitum. I'd love people like them as teachers. Actually, that's exactly what they are doing right now.
@Cr42yguy
@Cr42yguy 6 жыл бұрын
Niels Schellekens i was kind of sad when the video was over after about 13 minutes :(
@barendts
@barendts 6 жыл бұрын
yeah, if he tells you it's unsafe, would you still use it?
@Noodl
@Noodl 6 жыл бұрын
I'm taking Mike's module in Computer Security next year :^) He's a lecturer at my uni
@YingwuUsagiri
@YingwuUsagiri 6 жыл бұрын
That´s so cool! Do you ever talk about his videos in Uni? Would be an amazing tie in to learn more of the details!
@Noodl
@Noodl 6 жыл бұрын
Yeah definitely! Graham Hutton teaches a Haskell module, and a few times he suggested we check out his video on the Lambda calculus and other concepts. Steve Bagley and Max Wilson also reference their videos occasionally. There's some real interesting stuff on this channel.
@PElder78
@PElder78 6 жыл бұрын
There are actually 5 factors you can choose from: Something you know (password) Something you have (phone, token, whatever) Something you are (fingerprint, iris, etc) Somewhere you are (geolocation, proximity detection) Somewhen you are (only on specific days/times) The last two are rarely used, but ARE valid factors (a common thing for somewhere is being able to unlock your phone without a password as long as you're on your home wifi or within X distance of GPS coordinates).
@PElder78
@PElder78 6 жыл бұрын
Alexander McColl its more applicable to banking than you think. "When can the vault be opened?" "Only during business hours" (no rogue employees coming back after hours and openings the vault) "At least 30 minutes after the request" (fouling a bank robbery as if they are still there 30 mins later, they are caught)
@zockertwins
@zockertwins 6 жыл бұрын
So if my car opens when I get close to it, this is authorisation by localization ?
@jordanwaeles
@jordanwaeles 6 жыл бұрын
no, it's something you have (the wireless keyfob transmitter). Also a flawed pattern for cars, since it only uses something you have, and also allows for amplification attacks (bring an amplifier between your bedroom window and your car while you're sleeping with your keyfob => open and start the car)
@zockertwins
@zockertwins 6 жыл бұрын
Isn't it both then ? You have to have the key and be in range of the signal.
@darnell8897
@darnell8897 6 жыл бұрын
Methinks, the some*where* of your home wifi is essentially the some*thing* you have of the router itself.
@cowboyfrankspersonalvideos8869
@cowboyfrankspersonalvideos8869 6 жыл бұрын
Back in the mid 1980's when the company my partner worked for got computers in each office, someone in top management insisted they require all employees to use complex passwords, no real words were allowed and they had to be changed every week. Of course no one could remember these crazy passwords so management recommended they write them down on sticky notes and stick them on their monitors. That lasted about 3 months before some top secret government documents were stolen by someone on the cleaning crew.
@thenaughtyapartment2619
@thenaughtyapartment2619 5 жыл бұрын
That's quite a story!
@flowtoolz5554
@flowtoolz5554 Жыл бұрын
classic. when you compromise usability, you lose usability and security.
@ToastiLP
@ToastiLP 6 жыл бұрын
I always found 2FA to be quite convinient, since it takes only bout 10 seconds to get my phone, open the app and type it in and I rarely have to do it. All the while it removes a huge security risk. Anyway that's what I thought until I lost my phone's data and had to reset everything.
@Slada1
@Slada1 6 жыл бұрын
red toasti Just store 2FA keys on paper. Even with them, no one can access your account without your password.
@jeremia9077
@jeremia9077 6 жыл бұрын
If you're using Unix time, Timezones shouldn't factor in, as Unix time *should* be the same no matter where you are; The "time" where you are is then calculated after that.
@yvrelna
@yvrelna 6 жыл бұрын
Jeremia Dominguez Time zone could still be a problem though. If someone misconfigured their machine to use a different timezone than what it really should be, but set their real time clock so that they're seeing a "correct" time, then the machine will think that it's in a different Unix time than the actual Unix time. A common misconfiguratio for example would be someone who adjust for daylight savings by moving the real time clock rather than by choosing the correct timezones for their area. Or a technically challenged user who fixes their computer's clock by moving the real time clock when moving to a different country.
@zenorbi
@zenorbi 6 жыл бұрын
I always think of timezones as a date format parameter, unless of course I need the calculate the beginning of the day, 8 am specifically, or something like that.
@jackt6112
@jackt6112 3 жыл бұрын
I would think if the device is using NTP or cellular network time to remain synched, rather than manually putting in the time, they cannot miss.
@TheAkashicTraveller
@TheAkashicTraveller 3 жыл бұрын
@@jackt6112 You can also get an, actualy extremely acurate, time from GPS since it actualy calculates your position and time based on the position and clock of the satelites.
@abstractapproach634
@abstractapproach634 3 жыл бұрын
@@birsp So is that in the kernel (not hardware right) it must use it's own best clock (its crystal reference clock) and it's best measure of how fast its clock is. Still, without a regular internet connection it would get off after a while. *I'm glad you brought this up, interesting stuff* So does the crystal go even when the machine is off? Or is there some other unit by which it counts, probably less precisely l, when it's off. Hmmmmmmmmm, I'm sure it depends on the hardware (I doubt RPI will keep time without a connection but I will test this. Forgetting myvwifi signal now, I let you guys know if I have the right time tomorrow.
@DKRCecer
@DKRCecer 6 жыл бұрын
"correcthorsebatterystaple" you say?
@stensoft
@stensoft 6 жыл бұрын
The safest password there is
@Diggnuts
@Diggnuts 6 жыл бұрын
Indeed... I use it all the time!! ... Ummm. Whoops.
@smartyguyyful
@smartyguyyful 6 жыл бұрын
Diggnuts not so safe any more!
@jeffirwin7862
@jeffirwin7862 6 жыл бұрын
Fash Pone you're safe, all I see is ********
@OvertakeGT
@OvertakeGT 6 жыл бұрын
HuNT3r2 is uuncrackable!
@aarcaneorg
@aarcaneorg 6 жыл бұрын
In one of the episodes, Data impersonates Picard's voice to commandeer the enterprise.
@grn1
@grn1 3 жыл бұрын
Don't remember that episode.
@Yakobo15
@Yakobo15 2 жыл бұрын
@@grn1 Data's creator is dying and sends a signal telling him to come see him basically, but it turns data into "cannot be stopped" mode and locks everyone out of the ship in like a minute.
@grn1
@grn1 2 жыл бұрын
@@Yakobo15 That sounds vaguely familiar now. Guess I'll have to go back and rewatch TNG sometime.
@longingheart77
@longingheart77 6 жыл бұрын
I love you guys! I can work under my british accent watching your videos and also get some knowledge about my passion wich is computer programming. Keep up your fabulous work !
@alexmiszkiel5791
@alexmiszkiel5791 6 жыл бұрын
I'm glad Mike sorted the ghost cube on the shelf! He's a great lecture as one of my highest grades was in his security lecture :D
@KaeVF
@KaeVF 6 жыл бұрын
I love that the password was "correct horse battery staple".
@bluekeybo
@bluekeybo 6 жыл бұрын
Love Dr Pound! More videos with him please!
@Ganorthic
@Ganorthic 6 жыл бұрын
for some reason i watch exclusively the videos where DR Mike is talking
@evenprime1658
@evenprime1658 2 жыл бұрын
meh boy mike has the most loveable facial expressions and way of speaking.. like idk its just soo nice to just watch
@glazare364
@glazare364 3 жыл бұрын
I learned so many things that my university didn't really teach me in this channel Thank you guys
@Swipe650
@Swipe650 6 жыл бұрын
Pound that thumbs up button for Dr Mike
@jeffirwin7862
@jeffirwin7862 6 жыл бұрын
No wonder he's a hash expert
@michael-gary-scott
@michael-gary-scott 6 жыл бұрын
+Jeff Irwin AMAZING! 10/10 punnage!
@AnimilesYT
@AnimilesYT 6 жыл бұрын
The video is 12:34 long. Well done :D
@joshstephenson2475
@joshstephenson2475 6 жыл бұрын
The perfect example of a bad password. lol!
@code-dredd
@code-dredd 6 жыл бұрын
It marks 12:33, but close enough?
@user-iu1xg6jv6e
@user-iu1xg6jv6e 6 жыл бұрын
That time when it accepted "12345678" but entering "mypenis" failed saying "too short"!
@EgoShredder
@EgoShredder 6 жыл бұрын
"password" ? Oh no you have just revealed your main err password as used by thousands! ;-)
@username65585
@username65585 6 жыл бұрын
Authy allows you to have your 2FA be shared between multiple devices.
@stxllr4687
@stxllr4687 2 жыл бұрын
Thanks dude, this was very helpful, you're carrying my CS exam right now. :)
@MrBluemoon74
@MrBluemoon74 6 жыл бұрын
In StarTrek the thing to "have" is your personalized communicator. It has to be in the same room as the attemt is done from. More than once you see them tap their communicator first before they say their password. If you lost your communicator you probably can do it, but you have to "reprogram" the computer first.
@sillylittleboy93
@sillylittleboy93 6 жыл бұрын
"put it aside for today" Man a biosecurity video would be so cool!
@2FAS
@2FAS 3 жыл бұрын
2FA gives an extra layer of protection and you can easily enable it for various services
@JaydentheMathGuy
@JaydentheMathGuy 3 жыл бұрын
Nobody: Computerphile: Ah let’s start talking about passwords-
@DeathlyTired
@DeathlyTired 6 жыл бұрын
TOTP will forever be 'Top of the Pops'
@kestrelwings
@kestrelwings 6 жыл бұрын
There is a problem with one version of 2 factor. A number of people have run into an issue where a hacker gets control of their phone number and then goes to various websites and clicks "reset password." Not only is the hacker in, but the original user is frozen out. Sometimes the hacker calls up the phone company, claims to work in a store and they are selling a new phone to a customer. If the operator is stupid, she may transfer the phone number to the hacker's phone.
@eyob.bekele
@eyob.bekele 3 жыл бұрын
Nice gentleman, a lot of briefing for enthusiast. Thanks.
@mortenmoulder
@mortenmoulder 6 жыл бұрын
I love when Mike explains cryptography. It would be nice to see more about OTP and the XOR function behind it.
@gusutabopb
@gusutabopb 6 жыл бұрын
"I mean you smash your phone the last thing you're thinking about is 'ah, I must save my Google authenticator passwords!'" (4:40) Really? That's the single thing I am the most scarred about losing my phone. Everything else is backed up to the cloud, so if I lose my phone the only real loss would be the physical device (which can be replaced with a a few hundred dollars) and the damn 2FA passwords (which I have over 20 of), which can be a REAL PAIN to recover. Theses days, I just keep a safe hard copy of the QR codes and instead of Google Authenticator, use Authy (which has some backup/recovery functionality).
@sauron1427
@sauron1427 6 жыл бұрын
Nice xkcd reference xD
@lucianodebenedictis6014
@lucianodebenedictis6014 6 жыл бұрын
The timezones are real!
@QuietDuplicity
@QuietDuplicity 6 жыл бұрын
xkcd reference? I mean I'm pretty sure I've seen the xkcd time zone comic strip you're talking about but I thought they were referencing their own time zone video they did a couple years ago.
@zikcify
@zikcify 6 жыл бұрын
I'm fairly sure he was talking about the password at 1:05
@EmeraldMack992
@EmeraldMack992 6 жыл бұрын
Correcthorsebatterystaple
@rchandraonline
@rchandraonline 6 жыл бұрын
Timezones _shouldn't_ figure into it, because Unix time is always UTC. Any local time is derived from that according to those really complex rules Tom Scott explained. It may be a bit of a challenge on systems which do not keep their time in relation to that Unix time, but a lot of the popular OSes (e.g., Linux) do.
@Mister1Slime
@Mister1Slime 6 жыл бұрын
Best password ever Mike (correcthorseb)
@Shadow81989
@Shadow81989 6 жыл бұрын
Yeah, if only we had a video on time zones... perhaps with a guy in a red t-shirt? (imho the best video EVER!)
@skate2late
@skate2late 6 жыл бұрын
The one time generated password might just be a regular password in the sense that it uses a pre shared key, but at least this pre shared key is not susceptible to any sort of social engineering or phishing attack, like a normal password is
@user-cx2bk6pm2f
@user-cx2bk6pm2f 3 жыл бұрын
Who is this guy?? He should be an educator. Fantastic speaking and explanatory skills! And btw, to whom is he speaking? Is he being interviewed/ Why else does he looks past the camera?
@fllthdcrb
@fllthdcrb 6 жыл бұрын
12:24 In _ST:TNG,_ we've seen that the system can be fooled, although it does take some special circumstances. There's that one episode (4x03, "Brothers") where Data goes haywire and hijacks the _Enterprise_ by imitating Picard's voice. And then he turns the security against the crew by locking all command functions with a security code much longer than most humans would be able to remember.
@Ken.-
@Ken.- 2 жыл бұрын
Including the ship's computer. What was on screen didn't match what Data was saying.
@ben_clifford
@ben_clifford 6 жыл бұрын
I have also wondered the same thing about Star Trek. Recently, I've been trying to figure out if it's really a password that the commander is speaking, or maybe some sort of verification code that they didn't use something like "initiate self-destruct" in a sentence.
@TheAkashicTraveller
@TheAkashicTraveller 3 жыл бұрын
Maybe it's actually a very long one time password that's being whispered to them by their communicators. Would also explain how they remember them.
@6612770
@6612770 6 жыл бұрын
To survive through the repair scenario, always keep an 'old phone' in your cupboard that will work with your current SIM card.
@YuvrajHanspal
@YuvrajHanspal 4 жыл бұрын
11:00 timezones - the bane of programmers existence!!!!
@user-gd6il5zb8l
@user-gd6il5zb8l Жыл бұрын
You could have stored all your TOTP keys in a separate database of a password manager and, once you phone has broken down, you'd ask a friend for a substitute phone for a few weeks if they have a spare obsolete model, and you'd install the password manager there and the TOTP base. Your story about the two weeks without TOTP is actually what happens when you know enough to set up a password manager and use a password database regularly but forget to set up proper backup system BEFOREHAND. If you TOTP base exists only on your phone and doesn't get backed up regularly and often enough, then when you phone breaks you'll lose it, so find out how to better sync and backup stuff from your many clients. And better use cloud + encryption for one of the backup copies, but also have a few local ones. And maybe store the backups in such a way so that you'd have 3 (2 local and 1 in the cloud) up-to-date ones and 3 (2 local and 1 in the cloud) 1 day or so late, and also have version control for all your backups, that way, even if you do something wrong and the new backup isn't right, the version control will have the previous version and the 1 day late scheme will save you from re-writing a backup repo with a repo that has a corrupted index. Check out BorgBackup.
@Deimos94
@Deimos94 6 жыл бұрын
Is it really 2FA iftheyI can say “I forgot my password” and now my phone is enouth to get anyone into my E-Mail account and therefore all other accounts?
@MitsumaYT
@MitsumaYT 6 жыл бұрын
"Forgot my password" usually doesn't remove 2FA, you can not just get into anything by only having the 2FA key. There is always a weak point but 2FA is meant to give security by separation. An attacker would have to compromise two systems or get your phone otherwise which very much increases the security. Obviously there are ways to remove your 2FA key in many places but those usually require more extensive verification of the user or at the very least verification via email which should also have its own 2FA ideally. 2FA main benefit is also that even if some website leaks your password due to an attack on that site your stuff is still secure.
@johanandersson8464
@johanandersson8464 6 жыл бұрын
That would just be a second single factor authentication method.
@gdthegreat
@gdthegreat 6 жыл бұрын
best channel. best content. your explanation is best. but please give subtitles for this video.
@RailgunRat
@RailgunRat 6 жыл бұрын
Interesting topic! I'm curious about the difference between 2-Step Verification and 2-Factor Authentication, and what criteria define them? For instance, hackers have been able to take over people's phone numbers and intercept the security texts - thereby fullfilling the possession factor without physical accesss to your phone. (I've seen claims, that texts therefore only count as 2SV and not 2FA, but I don't know, if this definition is correct.) And would an app like Google Authenticator be impervious to this kind of trickery?
@epictimesnine
@epictimesnine 6 жыл бұрын
@computerphile Correction: Retina scan, voice recognition, and password is still just 2FA because the first two are the same factor. 5:42
@JNCressey
@JNCressey 6 жыл бұрын
Nah, clearly your eyes are 'something you *have.'* :D
@jeffreyd508
@jeffreyd508 3 жыл бұрын
Those 16 digit codes that we are given when we set up 2FA on an app such as Binance, or similar. Can we re-view them/check if they are correct somehow?
@cfsscfsshk
@cfsscfsshk 6 жыл бұрын
Warm reminder: if you are using iPhone, you can turn off message previews under notifications -> messages -> Show previews (scroll to bottom) -> set to "When Unlocked". To prevent people get your phone and allow them to get the one time code. Now at least they also need to know your pin to unlock the phone first.
@NigelThorne
@NigelThorne 4 жыл бұрын
How does FIDO2 work? The flow of data is one way, so it's not a challenge/response mechanism. How does the server know the generated code is valid?
@silkwesir1444
@silkwesir1444 6 жыл бұрын
there actually is an episode of Star Trek: The Next Generation, where Captain Picard falls victim to a phishing attack! ("Ship in a Bottle", season 6). i find that especially noteworthy as back when it was made it was the early 1990s, before such a practice became something of note. idk if the term "phishing" even was invented back then, though it might have been... of course, the voice imprint as second factor doesn't help a lot if you can record the audio of him saying the password (or when you can outright synthesize the voice)...
@Vietnamkid1993
@Vietnamkid1993 4 жыл бұрын
If both the device and the server are set internally in UTC, how do timezones affect this method? UTC doesn’t use timezones.
@klaxoncow
@klaxoncow 6 жыл бұрын
Surely, though, the Star Trek computer simply tracks everyone's location? This has happened in many episodes where a member of the crew would ask the computer "Where's Riker?" and it would give them his current location on board the ship. So you'd have the idea that, when you get on board, the ship identifies who you are - say, by biometrics (which, of course, if they take the transporter to board the ship, then you've got the perfect biometric that the transporter buffer has them stored right down to the atom, to confirm who they are on an atomic level) - and then, whilst on board, the computer's always tracking everyone with its internal sensors. Once it knows that that heat signature is Commander Riker, then it can follow that heat signature around the ship with its sensors to be aware of where Riker is at all times. And if that heat signature starts ordering commands, then it knows that it's Riker already. So, really, the voice recognition is just a double check - just in case, in tracking people wandering about the ship, it didn't at some point get confused as two people got very close together and mixed them up - which leaves you with the idea that the password is actually a sanity check. And by sanity check, I literally mean a check of that crew member's sanity. It's not authentication, but rather a deliberately inconvenient "are you sure?" prompt, so they can't set off the self-destruct accidentally, but have to really very deliberately mean it.
@shanbatej
@shanbatej Жыл бұрын
Do keys make you secure? like hardward, like the yubikey 5c nfc?
@DJayDiamond
@DJayDiamond 3 жыл бұрын
Is there any need for this if you use really long randomly generated passwords which can't be cracked or stolen in a password manager? Also if you have a recovery code stored somewhere if 2fa fails on you then all an attacker needs is that code right?
@Seegalgalguntijak
@Seegalgalguntijak 6 жыл бұрын
Also, biometric markers, no matter if it's a fingerprint, a face image, voice print or gait recognition, are never useful as an authenticator - because an authenticator (as in "your password") must have the ability to be changed, but you can't change your biometric markers. Which makes them useful only as the identifyier, that is the "user name" part of the authentication process. So if you swipe your finger or hold your face into a camera, and it recognizes who you are and then asks you for authentification (no matter how many factors), that would be acceptable for a service that is allowed to know you real identity. However, if it knows who wants to log in and then uses your biometric marker to log you in automatically, that is just stupidly unsafe. And yes, we all do it - I even installed fingerprint-gui on my laptop as a convenience feature, instead of having to type my password for every time I want to sudo something. But that works only locally, not over the interent.
@SupGhostly
@SupGhostly 4 жыл бұрын
Stay on track.
@fabriziodutto7508
@fabriziodutto7508 3 жыл бұрын
@10:56 About time zones problem: that's why EPOCH or UTC is used, for this kind of applications... :-) My big concern on data exchange nowadays is focused on different character encoding troubles...
@kvelez
@kvelez Жыл бұрын
0:43 2FA 2:15 Combination. 3:45 Multifactor authentication. 5:34 2FA as a subset.
@JakeHillion
@JakeHillion 5 жыл бұрын
I've had my phone replaced before and just completely forgot that I needed to store these somewhere. Slightly concerned that every service let me reset it with basically no additional verification...
@TheAkashicTraveller
@TheAkashicTraveller 3 жыл бұрын
I mean they still send you an email you have to get a code/link from to do so. Which admitedly isn't great. The ones that don't make it so easy warn you about keeping recovery codes just in case.
@mocire
@mocire 3 жыл бұрын
so my master password is 11 characters long with symbols, upper and lower case letters and digits. would this be considered strong or weak?
@frankhaugen
@frankhaugen 4 жыл бұрын
Best passwords I've used, (I don't use this exact, but the same concept), follows this general idea: Land0Of1The1Free2And3Home5Of8The13Brave! A sentence from something that is easy to remember, the words Titleized, separated by numbers from a sequence you know, end by a special character. Super easy to remember, extremely hard to crack
@cryptosistersuk621
@cryptosistersuk621 6 жыл бұрын
Hi, I think this is a great video for my followers and so is it ok to share?
@danfoad
@danfoad 6 жыл бұрын
Turned down an offer for studying Computer Science at Nottingham, these videos really make me regret that choice
@flowtoolz5554
@flowtoolz5554 Жыл бұрын
how did we get from "more factors help" to "oh and the additional factor cannot just be random, let's look at this HMAC" ?
@CyclingSteve
@CyclingSteve 6 жыл бұрын
I only remember passwords being said aloud on Star Trek TNG, they were self destruct codes. Hard to use twice. :D
@silkwesir1444
@silkwesir1444 6 жыл бұрын
no, they do it all the time, most often for overriding safety features (i.e. pushing equipment past their normal intended use), unlocking encrypted messages or for transferring access privileges from one person to another. also, on The Original Series, they (at least) once used their self-destruct codes, but canceled it before the countdown ran out. and apparently even after that they still didn't change those passwords, even some 15 or so years later when they actually destroy the ship in Star Trek III, they use the very same passwords from back then!
@pavel9652
@pavel9652 4 жыл бұрын
I don't think timezones matter, as Google Authenticator and similar apps use UTC, it would be a nightmare otherwise. HMAC OTP can also be sync by server trying N future codes to find one provided by client. Thanks for the excellent video!
@_AN203
@_AN203 2 жыл бұрын
4:48 That is why there is one time use code sent to your account after you use MRS so you can use it to login back and copy the 2fa secret to the auth app
@xylexrayne8576
@xylexrayne8576 11 ай бұрын
11:03 Timezones DONT cause a problem. Unix time is in UTC time, and timezones are handled by the computer and it's own locale configuration. Unix time does not keep timezone data.
@wirelessbaguette8997
@wirelessbaguette8997 6 жыл бұрын
I know I'm several months late, but I wish you'd touched a bit more on the increased vulnerability to phishing MFA can lead to. If you know you have MFA set up for an account, receiving an email which states "a login attempt was made, if it wasn't you, click here to change your login information" might make you more likely to follow the link without checking the email address itself or other signs of phishing. Then you've clicked the link and filled in your "old" login info and now the phisher has that info.
@lucasnathan80
@lucasnathan80 5 жыл бұрын
Do you have a video about how fingerprint authentication works?
@BrendanxP
@BrendanxP 6 жыл бұрын
12:34 I like it
@raylawlor4887
@raylawlor4887 6 жыл бұрын
In my dad's house... every electronic device is called a "doofer"... everything from the TV Remote, to the washing machine... :D
@OmarQunsul
@OmarQunsul 2 жыл бұрын
Which previous video was he referring to?
@Left4Cake
@Left4Cake 6 жыл бұрын
Discord had one time password to diable the 2FA should you loose it ideally they are kept someplace phyiscally safe or in such a way that if someone finds it they have no idea what these numbers are like you call the file gameshark-codes.txt or something
@mmahgoub
@mmahgoub 6 жыл бұрын
What is the appropriate way to store the secret key when using Google Authenticator?
@qwertz12345654321
@qwertz12345654321 6 жыл бұрын
for some reason this reason doesnt play with sound for me :( other videos work just fine..
@dethbolt000
@dethbolt000 3 жыл бұрын
@Comupterphile. I am wrong for presuming that 2FA to work, I must have a KEY that corresponds to my Facebook profile to gain access? My situation is that my account was hacked and then the activated the 2FA feature that I hadn't previously used. Facebook confirmed that I was hacked, but since I was logged out on my other devices, I can't access the key. I've contacted FB, but they've been giving me a hard time... They won't deactivate/bypass the feature and won't send me text authentication instead... What can I do?
@RiscTerilia
@RiscTerilia 6 жыл бұрын
Surely Unix Epoch is the same in all time zones though?
@vN2w3Z59BM
@vN2w3Z59BM 6 жыл бұрын
Please enable captions, I'm a deaf
@carlcarlos5265
@carlcarlos5265 3 жыл бұрын
Yeah listen to that guy
@vN2w3Z59BM
@vN2w3Z59BM 3 жыл бұрын
@Pure Hungarian well, 3 years ago or before they did not activate them
@wigsnes
@wigsnes 6 жыл бұрын
Talk about DES and AES
@dreammfyre
@dreammfyre 6 жыл бұрын
Demolition Man. Just putting that out there.
@nuckymcnuck
@nuckymcnuck 6 жыл бұрын
I hate to be pedantic, but TOTP HMAC is 2SV, not 2FA. There is a second step to logging in, not a second factor to logging in. A true second factor would be a Yubikey. The only XFA, where X > 2, that I know of that actually works is MIRACL.
@zakariahajji9336
@zakariahajji9336 6 жыл бұрын
Can I have please the names of the books over his head ?
@jasongomez5344
@jasongomez5344 5 жыл бұрын
Look for the mobile and Chrome extension called Authy, which is much better than Google Authenticator, as it allows you to sync between all your devices.
@OthmanAlikhan
@OthmanAlikhan 3 жыл бұрын
Thanks for the video =)
5 жыл бұрын
In Star Trek I think there is a kind of synchron-translator system that may obfuscate the told password.
@jeremia9077
@jeremia9077 6 жыл бұрын
Oh, another problem is SMS authentication. A website recently had a hacking incident, where someone called up the website owner's phone company, convinced them they were the owner of the phone, and had the number moved to another SIM card. So when they tried to reset the person's password and received an SMS to verify their identity, the message was sent to the attacker's phone instead. This probably would not have happened if the 2-factor authentication wasn't through SMS, and instead through something like Google's Authenticator App, but it just shows that the biggest point of weakness in any security system you can think of is the Human element. Aka, Social Engineering.
@psandbergnz
@psandbergnz 4 жыл бұрын
The video started off so well but then needlessly complicated.
@nathancornwell1455
@nathancornwell1455 4 жыл бұрын
Ever since i seen a white-hat hacking expo were a security expert showed that he could intercept text messages, i dont use my phone for password recovering or 2FA unless its the only option.
@azkamil
@azkamil 6 жыл бұрын
Now please tell us about push based (to mobile phone) 2 factor authentication, e.g from Microsoft
@xxSepelxx
@xxSepelxx 6 жыл бұрын
It looks like his watch is/was broken and he had to repair it. The card on our table spelling "Tick King" says many things ;)
@ls72n9kd
@ls72n9kd 6 жыл бұрын
I notice you use Samsung Android. Do you know “how safe” is Apple’ Notes and Numbers encrypting passwords?
@jamesedwards3923
@jamesedwards3923 4 жыл бұрын
Look up the OPAL gudielines and they failed. Apple has closed source encryption. However, their code is solid enough if third parties are hired to break it. Governments that have special licensing contracts with Microsoft get to review the code. It is how the technology is implemented that is the concern. Your point is valid.
@baldeepbirak
@baldeepbirak 6 жыл бұрын
2FA is a must for financial systems. Most other systems work well with strong passwords.
@Eysc
@Eysc 4 жыл бұрын
Same happened to me with Google authenticator, never again, use Authy if you lose your phone just initiate session on other defice to get access to your 2fa
@Seegalgalguntijak
@Seegalgalguntijak 6 жыл бұрын
A friend of mine had his Android phone break on him, which then made it impossible to log back into his Google account from his PC becaue he couldn't acknowledge the second factor on his phone. He had to get another phone first and then he could use his account and his email again. He turned off 2FA after that experience.
@MythOfEchelon
@MythOfEchelon 6 жыл бұрын
Authy FTW! You can export an encrypted backup!
@scepts
@scepts 3 жыл бұрын
why wouldnt 2fa be read first then the password. So that people couldnt social engineer your password?
@sheglova
@sheglova 2 жыл бұрын
Perhaps in Star Trek their communicator provides an exact location, and it verifies both the voice and the location of the voice match.
@Estlib
@Estlib 6 жыл бұрын
Nice midi woodblock for phone tapping sfx lol
@garretmkiii
@garretmkiii 6 жыл бұрын
Steamguard... :/ Why every time? Sheesh.
@danielgarcia7999
@danielgarcia7999 4 жыл бұрын
Name of C++ book on the shelf?
@litovillar6027
@litovillar6027 2 жыл бұрын
My brain cells just died listening to his explanations lols
@christopherdaniel4636
@christopherdaniel4636 5 жыл бұрын
Please, I down load 2factor authenticator and start using it without registering, and now the one time password is no more in the app, it all wipe off. How can I get the app working again.
Have You Been Pwned? - Computerphile
10:59
Computerphile
Рет қаралды 477 М.
Cookie Stealing - Computerphile
16:12
Computerphile
Рет қаралды 1,1 МЛН
1🥺🎉 #thankyou
00:29
はじめしゃちょー(hajime)
Рет қаралды 79 МЛН
$10,000 Every Day You Survive In The Wilderness
26:44
MrBeast
Рет қаралды 83 МЛН
LogJam Attack - Computerphile
18:47
Computerphile
Рет қаралды 179 М.
Taming Kerberos - Computerphile
16:06
Computerphile
Рет қаралды 319 М.
Diceware & Passwords - Computerphile
10:56
Computerphile
Рет қаралды 304 М.
How to Choose a Password - Computerphile
11:33
Computerphile
Рет қаралды 1,2 МЛН
Why You Should Turn On Two Factor Authentication
8:12
Tom Scott
Рет қаралды 2,1 МЛН
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,4 МЛН
When Unix Landed - Computerphile
13:12
Computerphile
Рет қаралды 146 М.
Securing Stream Ciphers (HMAC) - Computerphile
9:24
Computerphile
Рет қаралды 303 М.
AI's Game Playing Challenge - Computerphile
20:01
Computerphile
Рет қаралды 741 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
1🥺🎉 #thankyou
00:29
はじめしゃちょー(hajime)
Рет қаралды 79 МЛН