STOP using this Two-Factor Authentication (2FA) method!

STOP using this Two-Factor Authentication (2FA) method!

Liron Segev

2 года назад

370,779 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

rika
rika - 11.09.2023 23:24

Hello i apologise in advance for taking your time sir i want to address this issue it's very urgent someone has signed into my account and has Access to almost everything even after 2 step verification is on . They are saved in my google prompt settings and hence I can't even remove them sir please help what i can do to remove them 😢🙏

Ответить
TheDragonshadow1231
TheDragonshadow1231 - 10.09.2023 17:17

Just like your landline phone number using a call blocker that blocks spoof numbers. Like sentry block, Truecall, etc.

Ответить
Tom Williams
Tom Williams - 03.09.2023 13:19

Just use a SIM pin

Ответить
Amul Pandya
Amul Pandya - 29.08.2023 09:20

next is 3FA then 4FA, 5FA, 6FA...

Ответить
legend Guitar Scale
legend Guitar Scale - 20.08.2023 11:08

i have aquestion , ¡How for exemple twiliios authy or this companies win money? no one will structure a big company for administrated keys personal for free,, i dont knoy how yhey win money,

Ответить
Fauza
Fauza - 16.08.2023 21:09

Yes . For many times its very long time to get the code . And there is no code verification sent on sms . I hate it

Ответить
Olivier
Olivier - 06.08.2023 11:48

Someone was able to access my Amazon account without the mandatory OTP. Normally, the OTP are sent to my cellphone. I did not receive any OTP or access request. The fraudster even inputted a credit card that is not mine and was able to place 3 orders. I only noticed when I received the email confirmation for the orders. In addition, I don't use Amazon or any such service on my phone(which has wifi disabled) since I know how unsafe it is to use your cellphone for anything credit/debit/banking. Weird.

Ответить
Rich Vandervecken
Rich Vandervecken - 01.08.2023 21:09

I don't shop online, I don't bank online, and I see google as a collaborator with Communist China in the genocide being perpetrated in China today! Not to mention Google's role in covering up all the insurrectionist's activities being conducted in America at the moment!

Ответить
Blanca Bolita
Blanca Bolita - 23.07.2023 05:08

how I can take off this 2fa from my computer

Ответить
Yamaha Tracer Club
Yamaha Tracer Club - 22.07.2023 08:29

Hi Liron Shalom vema nishma? Excellent video. Just bought my self 4 Yubikeys need to get them soon. So as I understand I need to disable all my other 2FA methods and leave only the physical key enabled on the IG, FB, GG? Am I correct? Thanks 🙏

Ответить
stop08it
stop08it - 21.06.2023 16:45

This is weird, ALL MY BANKS USA 2fa for their online banking

Ответить
RVRSS
RVRSS - 04.06.2023 02:37

So as nothing is perfect and ecerything has its own flaws, you should stop using any of these flawed 2FA methods - or rather, prefer to use the least complicated one so as to avoid additional useless headache while you're anyway still remaining somewhat unsecure.

Ответить
Joe Boudreault
Joe Boudreault - 01.06.2023 22:24

I used Google Authenticator several times but my financial platform refuses to acknowledge it and it's difficult to get their helpline. Now what?

Ответить
Amrit
Amrit - 26.05.2023 07:15

Ответить
Jag 1010
Jag 1010 - 09.05.2023 04:17

All banks in the UK don't use authenticator app, only OTP

Ответить
Rogee Sweettee Toe
Rogee Sweettee Toe - 07.05.2023 19:04

I am a two-factor authentication security method but I broke my phone I log in before, and I have another phone now but no way to login into my Facebook. I need help. I have submitted my documents but my account hasn't been recovered yet.

Ответить
FortheKozofHelpingOthers
FortheKozofHelpingOthers - 07.05.2023 04:58

The issues, in my opinion, I have with privacy and security, are the background/partners with all the User functions being allowed by the background or partner of Google and their affiliates, to be overwritten or coded, or implemented, to whatever they want to use. NOT honoring the User settings. Giving them an attached ESim and/or Security key, and allowing them to completely free range and impede on any and all User information, privacy, security and to manipulate the original app coding to allow them to whatever they want. And, NEVER giving notice or getting permission from the USER. In turn, also, this allows the background/partner, to basically, impersonate the USER in setting up accounts, install apps, certificates, and manipulative actions to use the internet, (by all means of connection now available), phone calling video calls and texting services, email functions and all new available connections now available, calendar and it's functions, etc. The list goes on and on. They can even, basically, disable any actions by User and/or completely disable and destroy the User phone.
I normally would not even make any kind of comment about this kind of stuff. However, the info stated above, is what happened to me started a few years ago. And, can still cause issues today. I didn't know anything about this until it happened. Then, and Now, each time I spend to research these issues, I find out more and more that the USER, their complete privacy and security, are never being considered by the provider or their affiliates. No matter what they say. Of course, this is my opinion and personal experience. EVERYONE can have differences. So, please don't be hateful to me for sharing it

Ответить
Killian Craft of Craftyworks
Killian Craft of Craftyworks - 27.04.2023 23:26

I change my number every time I get a new phone. Helps get rid of spam callers lol.

Ответить
Le vieux
Le vieux - 31.03.2023 21:50

for google authenticator, you have to accept to give your phone number to google at least once, and for me this is out of question.

Ответить
Had It All
Had It All - 30.03.2023 21:42

No Yubi device? \ spoke to soon

Ответить
rayn1ful
rayn1ful - 26.03.2023 01:33

how does someone that does not have a cell phone or email address use 2fa?

Ответить
KRXFLE
KRXFLE - 22.03.2023 22:32

from the way how it's looking everything should have tor level security

Ответить
ronvdvr
ronvdvr - 21.03.2023 14:46

What if you lose your backup codes?

Ответить
Alex
Alex - 21.03.2023 09:41

If there's a few simple truths that I've learned in my 25+ years of experience in IT.
1. Nothing is 100% proof. If it can be engineered, it can be reverse engineered. Meaning if someone wants in bad enough, they are going to find a way in
2. The weakest link in any security, physical or otherwise, is always going to be a [person]
3. Some level of vulnerability mitigation is better than nothing.
4. Computers don't know ANYTHING except how to turn off and on until you program it to do so. So, again, the strongest attack and defense are always going to come down to the [person]
5. If you don't want things to be "hackable" over a network, the only foolproof way is to store it on a drive that never connects to a computer that touches any network.

Ответить
Krane
Krane - 20.03.2023 10:19

Anybody but Google.

Ответить
iLejukes
iLejukes - 18.03.2023 21:15

okay try to log without 2fa code :) lets see how you will deal it wit

Ответить
rita figueira
rita figueira - 18.03.2023 18:47

I was sim swapped a few months ago and that's when I stopped using 2 step verification. The person was able to get into my Yahoo emails because they had control of my phone number. After that they probably looked for banking email etc to try that. But I had a Gmail account for most important things. It was a nightmare. I can't close my yahoo account ever because it can be used by someone else.

Ответить
Kracker Games
Kracker Games - 17.03.2023 03:14

Physical Key > Authy > Google Authenticator

Ответить
Lunar Jellyfish
Lunar Jellyfish - 14.03.2023 21:32

The authenticator app is fine BUT that only works if the website that I am logging into is set up to use it.

Ответить
Christopher Evans
Christopher Evans - 14.03.2023 04:47

Just another battery to charge and can be lost.

Ответить
geniustic
geniustic - 12.03.2023 06:34

Show us please!

Ответить
Schreds
Schreds - 10.03.2023 19:24

While I've seen physical keys like Yubi, I don't know if there is one that is better than another.

Ответить
Ray Evans
Ray Evans - 10.03.2023 10:11

Does not show you how to stop the 2FA talks about it

Ответить
Michael G.
Michael G. - 08.03.2023 02:30

Authy for years now without problems.

Ответить
DarkWolf 41 Nite
DarkWolf 41 Nite - 07.03.2023 20:56

Can I store any passwords on the yubico key just woundering!

Ответить
DarkWolf 41 Nite
DarkWolf 41 Nite - 07.03.2023 20:54

I would have to be very careful an do this like your talking about

Ответить
DarkWolf 41 Nite
DarkWolf 41 Nite - 07.03.2023 20:52

I would like to get a 2FA key

Ответить
DarkWolf 41 Nite
DarkWolf 41 Nite - 07.03.2023 20:47

Or the 2FA key !

Ответить
Mark Arca
Mark Arca - 04.03.2023 16:38

2FA using SMS is less secure, because it is prone to SIM swapping. Here in the Philippines, due to the mandatory KYC (know your customer) policy for prepaid customers by the telcos due to a new law, I will use a security key instead, and logging in via email instead of mobile number, removing ALL mobile numbers from my Microsoft and Google accounts.

Ответить
Gk Notebook
Gk Notebook - 02.03.2023 10:49

As long as Banks ( atleast in my country ) don't stop using sms based OTP system there is no point in using other systems for other accounts

Ответить
James Collier
James Collier - 25.02.2023 22:27

Lastpass has left the chat

Ответить
salsa4u Moudrik
salsa4u Moudrik - 19.02.2023 17:17

you didn't speak about biometric authentification in the mfa

Ответить
Paul-Erik Hansen
Paul-Erik Hansen - 19.02.2023 16:18

Look at 2FAS authenticator, it does not require any personal details, phone, mail etc.... :-)

Ответить
notusedexer
notusedexer - 18.02.2023 09:59

If you use 2 factor, the app you use it on should further question you when you sign on from a new device. It should make you answer security questions which no one should know but you. Remember, never give the correct answer to a security app

Ответить
notusedexer
notusedexer - 18.02.2023 09:57

They can't answer your security questions if you don't answer them correctly in the first place.

Ответить
CodeMe
CodeMe - 14.02.2023 14:45

My experience as a power user,
Microsoft Authenticator is the best so far. Has a decent cloud backup system via a Microsoft account and the security features you talked about. It's AWESOME!

Ответить
Justin Case
Justin Case - 13.02.2023 10:26

You nailed it. Authy and OTP Manager work well. I wouldn't trust Google authenticator if my life depended on it.

Ответить
Jason Berger
Jason Berger - 11.02.2023 07:43

That's a huge downside if u loose or break ur phone and don't have transfer key ur locked out i wouldn't use a 2f authentication app

Ответить