Skip to main content

Two-factor security is the best lock for your digital life, but it’s not perfect

Netcrypt
Netcrypt
Two-factor authentication has become something of an online security buzzword over the last few years. Most of us have logged into one service or another only to be presented with a message urging us to implement this form of our protection on an account.

But two-factor authentication isn’t some silver bullet capable of stopping hackers in their tracks. It’s a useful countermeasure to have among your defenses, but ultimately, it’s no substitute for a working knowledge of the biggest threats we face online.

Activate two-factor authentication wherever the opportunity is offered up — but don’t make the mistake of relying on its protection if you don’t understand what it can and cannot defend against. As 2016 proved, the keeping data secure is complex, and overconfidence can leave you open to attack.

Are you who you say you are?

At its core, two-factor authentication is all about checking credentials. It’s a way of making sure that someone is who they claim to be, by verifying two distinct types of evidence. This kind of system has been around for years.

If you don’t understand the basics of computer security, you shouldn’t be allowed to bank on the Internet.

Chip-and-PIN credit card payments are perhaps the most ubiquitous example; they rely on the user having a physical card in their possession, and knowledge of their PIN. While a thief could feasibly steal a card and learn the PIN, it’s not easy to manage both.

There was a time, not so long ago, when financial transactions were the only reason people would have to authenticate their identity on a regular basis. Today, anyone that uses the internet has an array of accounts that they wouldn’t want just anyone to have access to, for a variety of reasons.

The financial industry managed to implement two-factor authentication very easily, because the only hardware that needed to be distributed was a bank card. Distributing a similar system for everyday websites is nearly impossible, so two-factor is enabled through other means. And those methods have flaws of their own.

User experience

“I am really sick of all the convenient things in life suddenly become too cumbersome to use,” reads a comment posted to a 2005 SlashDot article about the imminent rise of two-factor authentication in relation to online banking. “I would really, really hate to have a hard token to carry around.”

“Politicians have no idea what impact this has on the real world,” agreed a second, lamenting the threat of users being forced to purchase extra hardware. “If you don’t understand the basics of computer security, you shouldn’t be allowed to bank on the Internet,” added another commenter.

Today, complaints like these seem positively foolish, but in 2005 users were more considered about the cost and annoyance of carrying some form of two-factor token. User response can prove even more negative when something less important than banking is protected. In 2012, a class action lawsuit was filed against game developer Blizzard Entertainment after the company introduced an authenticator peripheral designed to defend users’ Battle.net accounts, per a report from the BBC.

LastPass
LastPass

Efforts to implement this kind of two-factor authentication had been in place since the 1980s, when Security Dynamics Technologies patented a “method and apparatus for positively identifying an individual.” By the 2000s, the infrastructure and manufacturing ability was in place for organizations ranging from financial institutions to video game publishers to enforce their own means of two-factor authentication.

Unfortunately, users decided not to co-operate. Whether the second factor of authentication was as simple as an LCD screen that delivered a unique code, or as complex as a fingerprint scanner, the idea of having yet another piece of physical hardware — and potentially one for every different service that required a unique log-in — was unappealing to the masses.

It’s possible to imagine an alternative history where two-factor never caught on because of this problem. Fortunately for us, Apple introduced the iPhone, and Google introduced Android. Smartphones put a device capable of two-factor authentication into the hands of billions worldwide, resolving the convenience issue that users complained about in 2005.

Smartphones are convenient, but have their own risks

The ubiquitous nature of smartphones has allowed sites and services to remove the hassle from the two-factor authentication process. “The ones that use your cellphone tend to be very easy to use, very low impact,” said security expert and Harvard fellow Bruce Schneier, speaking to Digital Trends earlier this month. “Because it’s something that you have already. It’s not something new that you have to carry around with you.”

It’s possible to imagine an alternative history where two-factor never caught on.

In certain scenarios, this approach can offer definite benefits. For instance, if you’re logging into a service from a new computer, you might be asked to input a code sent to a trusted device as well as your standard password. This is a good example of how to use two-factor authentication; someone else could have stolen your password and tried to log in to the associated account from their system — but unless they’ve already stolen your phone, they won’t be able to gain access.

However, there are threats that this kind of protection simply can’t handle. In 2005, Schneier wrote that “two-factor authentication isn’t our savior” in a blog post delving into its weaknesses.

He went on to describe how a man-in-the-middle attack could hoodwink the user into thinking that they’re on a legitimate website, and convince them to offer up both forms of authentication to a phony log-in screen. He also notes that a Trojan could be used to piggyback off a legitimate log-in that was carried out using two forms of authentication. There’s also the problem of centralizing security on a single device; most people use a smartphone-enabled two-factor for multiple websites. If that phone is stolen and compromised, all those sites are at risk.

Knowledge is power

“When you’re logging into your account, two-factor is great,” said Schneier. “My university, Harvard, uses it, my company uses it. Lots of people have adopted it, and it’s very useful. But what I was writing about then, the problem was it was looked at as a panacea, it’ll solve everything. Of course, we know it doesn’t.”

Financial gain is always going to motivate malicious hackers to cultivate new techniques for accessing other people’s accounts. As long as there’s a benefit to possessing someone else’s credentials, we’re going to see hacking evolve continually.

“There are a lot of different threats, and a lot of different security mechanisms,” Schneier explained. “There’s not just one threat, not just one mechanism, there are many threats and many mechanisms.”

The best defense is a continuous stream of new and improved countermeasures. If we continue to change and update the methods we use to keep our accounts secure, we make things harder for anyone trying to gain access without permission.

Unfortunately, the attackers have the initiative. It took years for two-factor authentication to become accepted by the masses. As new forms of protection become available, we as users need to commit to take advantage of them. And that puts us right back on the Slashdot forums, circa-2005. We all once again become users complaining about convenience, instead of worrying about security.

It’s difficult to ignore how commonplace large-scale hacks have become, and there’s no sign that this form of criminality is going to die off. There is no defense that’s 100 percent capable of blocking any kind of attack; criminals will always find a way to exploit even the smallest weakness. Although it’s not easy, the best way to stay safe online is to be aware of the threats, and aware of what can be done to safeguard against those threats.

Online security is like paying for insurance, or going to the dentist. It doesn’t seem that important, until it is. It’s not enough to simply opt-in to the forms of protection we’re offered by various sites and services. Knowing what kind of attacks these protections defend us from — and what they don’t — is the only way to take charge of your own security.

Editors' Recommendations

Topics
Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
The ASUS ROG Ally handheld gaming PC has a nice discount today
Starfield running on the Asus ROG Ally.

If you love the power of gaming PCs and the portability of the Nintendo Switch, you should think about getting a handheld gaming PC like the Asus ROG Ally. If you're interested, it's currently on sale from Walmart with an $87 discount that pulls its price down to $400 from $487. It's a pretty popular device so we expect this offer to attract a lot of attention, which means it's probably not going to last long. If you want to get this handheld gaming PC for this cheap, you should proceed with the transaction immediately.

Why you should buy the Asus ROG Ally handheld gaming PC
It's the version of the Asus ROG Ally with the AMD Ryzen Z1 Extreme that's listed in our roundup of the best handheld gaming PCs, but the Asus ROG Ally Z1 is still a worthwhile purchase because it gives you a gaming PC that you can bring with you wherever you go. Unlike a gaming laptop that's still pretty bulky with its large screen and keyboard, the Asus ROG Ally takes on the form of a portable gaming console like the Nintendo Switch, but with Windows 11 pre-installed as a familiar operating system to navigate and launch the best PC games.

Read more
The HP Victus gaming PC with RTX 3060 has a $550 discount
The HP Victus 15L gaming PC in white.

Gamers don't need to spend more than $1,000 if they want to buy a new gaming PC because there are affordable options like the HP Victus 15L gaming desktop. From its original price of $1,400, you can get it for just $850 as HP has applied a $550 discount on this machine. However, you shouldn't delay your purchase because there's no assurance that the gaming PC will still be 39% off tomorrow. If you want to make sure that you get it for less than $1,000, you're going to have to complete the transaction for it within the day.

Why you should buy the HP Victus 15L gaming desktop
You shouldn't expect the HP Victus 15L gaming desktop to match the performance of the top-of-the-line models of the best gaming PCs, but it's surprisingly powerful for its cost. Inside it are the 13th-generation Intel Core i7 processor and the Nvidia GeForce RTX 3060 graphics card, with 16GB of RAM that our guide on how much RAM do you need says is the best place to start for gaming. It's enough to play today's best PC games without any issues, and it may even be capable of running the upcoming PC games of the next few years if you're willing to dial down the settings for the more demanding titles.

Read more
This 17-inch HP laptop is on sale for just $300 — but hurry!
The HP 17t-cn300 17.3-inch laptop against a white background.

If you want to buy a laptop with a relatively large screen, the good news is that you don't have to break the bank with your purchase because you can get the HP Laptop 17t for a very affordable $300. It's on sale from HP with a $200 discount on its original price of $500, but there's no telling how much time is remaining before this offer expires. We don't think it will stay available for long because laptop deals like this almost always get sold out quickly, so complete the transaction as soon as possible to make sure that you don't miss out on the savings.

Why you should buy the HP Laptop 17t
With the 17.3-inch display of the HP Laptop 17t, you'll have a lot of screen real estate to work on your projects and watch streaming shows. It's pretty affordable for a laptop with this large screen, which offers HD+ resolution for sharp details and vibrant colors. However, despite its big display, the HP Laptop 17t maintains portability because it's only 0.78 of an inch thick, which makes it easy to slide into your bag when you're on the go, and it won't be too heavy to carry around because it only weighs about 4.6 pounds.

Read more