A number of people asking, "what's 2FA" while I've gone off on an infosec and auto side tangent.
It's a good time to learn about 2FA. It's basically a second key, of sorts, to use before you access your accounts. Here's how MSFT describes it.
https://www.microsoft.com/en-ie/security/business/security-101/what-is-two-factor-authentication-2fa
There are 3 main kinds:
SMS (better than nothing)
Authenticator (better than SMS)
Dongles
Twitter just fucked up the way their SMS 2FA works along with other stuff Elmo considers "bloatware."
SMS working just now. This reminds me i should not be using SMS for 2fa.
@genxjamerican @FredBear @emptywheel the way Authy manages this is a key value proposition for Authy. The trade-off is that it's an extra risk factor. Google Authenticator leans to the paranoid side. I recommend Authy for my colleagues because a certain ease of use is worth the trade-off for us.
It's important that your Authy recovery password is not easily guessable. (You can stick it in a bank vault, since you shouldn't need it often.)
@emptywheel Great to see Elmo's fuckups precipitate individual security advice from a preeminent national security journalist, but can I suggest focusing on FIDO keys (or passkeys) rather than on 2FA and ‘dongles’?
Biggest threat to accounts is phishing—if you click on a link to twltter.com in a DM from @TwtterSupport☑️ and are confronted by a login page, you might absent-mindedly enter your password. And your SMS 2FA code or TOTP authenticator app code. Game over—even though you used 2FA! Happened to Alexa O'Brien a couple weeks ago.
FIDO keys prevent phishing, with cryptography under the hood when you press a button—no copy & paste of code. But other hardware dongles like RSA SecurID are still vulnerable to phishing! The new ‘passkeys’ system (which is a variant on FIDO inside) also prevents phishing even though it's not 2FA.
(FIDO and passkeys also protect against guessable and reused passwords, just like other 2FA does.)