• BTC Dominance: %
XBT.Market
Advertisement
  • Home
  • Coins MarketCap
  • Crypto Exchanges
  • Crypto Calculator
  • Top Gainers and Loser
  • News
  • Contact Us
No Result
View All Result
XBT.Market
No Result
View All Result
Home Bitcoin

How To Protect Yourself With A More Secure Kind Of Multi-Factor Authentication

Jon Hartney by Jon Hartney
August 13, 2022
in Bitcoin, Blockchain, Business, Market
0
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

There are many ways to improve your security with multi-factor authentication, but some kinds offer more protection from hacking and tracking.

Related articles

Bitcoin derivatives data shows room for BTC price to move higher this week

January 23, 2023

Bitcoin price consolidation opens the door for APE, MANA, AAVE and FIL to move higher

January 22, 2023

This is an opinion editorial by Heidi Porter, an entrepreneur with 35 years in technology.

User Security

In previous articles about security and data breaches, we discussed the need for multi-factor authentication (MFA) on your Bitcoin accounts and any other accounts you want to protect.

Hacks will continue to happen where your account is compromised or people are sent to a nefarious site and accidentally download malware instead of verified software.

This will be the first in a series of articles around more resilient user security for your accounts, nodes and apps. We’ll also cover better email options, better passwords and better use of a virtual private network (VPN).

The reality is that you’ll never be completely secure in any of your online financial transactions in any system. However, you can implement a more resilient toolset and best practices for stronger security.

What Is Multi-Factor Authentication And Why Do I Care?

(Source)

According to the Cybersecurity and Infrastructure Security Agency, “Multi-factor authentication is a layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user’s identity for login.”

When we log into an online account, we’re often aiming to thwart an attacker or hacker using extra layers of verification — or locks.

Compared to your own home, multiple locks give more security. If one form of authentication is good, such as a password, then two forms (aka MFA) can be better.

Note that biometric authentication is single-factor authentication. It’s just the biometric of whatever modality you’re using: thumb, iris, face recognition, etc. If you use one hardware key without a passphrase, that is also single-factor authentication.

Where Should I Use MFA And What Kind Of MFA?

With MFA, you must have at least two authentication mechanisms.

At a minimum, you should have MFA set up for your:

  • Bitcoin exchanges (but get your funds off them ASAP after buying).
  • Bitcoin nodes and miners.
  • Bitcoin and Lightning wallets.
  • Lightning apps, such as RTL or Thunderhub.
  • Cloud providers, such as Voltage accounts.

Note: Each account or application needs to support the type of MFA that you are using and you must register the MFA with the account or application.

MFA providers often include less secure options such as:

  • SMS text messaging.
  • One-time password.
  • Mobile push-based authentication (more secure if managed properly).

MFA providers sometimes also include more secure options such as:

  • Authenticator apps.
  • Hardware keys.
  • Smart cards.

Guess what type of MFA most legacy financial institutions use? It’s usually one of the less secure MFA options. That said, authenticator apps and hardware keys for MFA are not all created equal.

MFA And Marketing Misinformation

First, let’s talk about the marketing of MFA. If your MFA provider touts itself as unhackable or 99% unhackable, they are spouting multi-factor B.S. and you should find another provider. All MFA is hackable. The goal is to have a less hackable, more phishing resistant, more resilient MFA.

Registering a phone number leaves the MFA vulnerable to SIM-swapping. If your MFA does not have a good backup mechanism, then that MFA option is vulnerable to loss.

Some MFA is more hackable.

Some MFA is more trackable.

Some MFA is more or less able to be backed up.

Some MFA is more or less accessible in some environments.

Less Hackable and Trackable MFA

Multi-factor authentication is more securely accomplished with an authenticator app, smart card or hardware key, like a Yubikey.

So if you have an app-based or hardware MFA, you’re good, right? Well, no. Even if you are using app-based or hardware MFA, not all authenticator apps and hardware devices are created equal. Let’s look at some of the most popular authenticator apps and some of their vulnerabilities with tracking, hacking and backing up.

  • Twilio Authy requires your phone number, which could open you up to compromise via SIM-card-swap. Initial setup is SMS.
  • Microsoft Authenticator doesn’t require a phone number, but can’t transfer to Android as it is backed up to iCloud.
  • Google Authenticator also doesn’t require a phone number, but does not have online backup and is only able to transfer from one phone to another.

In addition, all of these apps are considered by some to be less resilient and open to phishing or man-in-the-middle (MITM) attacks.

How Your Accounts And Finances Can Be Compromised

“People should use phishing-resistant MFA whenever they can to protect valuable data and systems” – Roger A. Grimes, cybersecurity expert and author of “Hacking Multifactor Authentication”

Just like many financial and data companies, Bitcoin companies have been the target of multiple data breaches where attackers have obtained email addresses and phone numbers of customers.

Even without these breaches, it’s not especially hard to find someone’s email addresses and phone numbers (as mentioned in previous articles, best practice is to use a separate email and phone number for your Bitcoin accounts).

With these emails, attackers can perform phishing attacks and intercept the login credentials: both password and multi-factor authentication you have used as a second authentication factor for any of your accounts.

Let’s take a look at a typical MITM phishing attack process:

  1. You click a link (or scan a QR code) and you are sent to a site that looks very similar to the legitimate site you want to access.
  2. You type in your login credentials and then are prompted for your MFA code, which you type in.
  3. The attacker then captures the access session token for successful authentication to the legitimate site. You might even be directed to the valid site and never know that you have been hacked (note that the session token is usually only good for that one session).
  4. Attacker then has access to your account.

As an aside, be sure you have MFA attached to withdrawals on a wallet or exchange. Convenience is the enemy of security.

Phishing-Resistant MFA

To be resistant to phishing, your MFA should be an Authenticator Assurance Level 3 (AAL3) solution. AAL3 introduces several new requirements beyond AAL2, the most significant being the use of a hardware-based authenticator. There are several additional authentication characteristics that are required:

  • Verifier impersonation resistance.
  • Verifier compromise resistance.
  • Authentication intent.

Fast Identity Online 2 (FIDO2) and FIDO U2F are AAL3 solutions. Going into the details about the different FIDO standards are beyond the scope of this article, but you can read a bit about it at “Your Complete Guide to FIDO, FIDO2 and WebAuthn.” Roger Grimes recommended the following AAL3-level MFA providers in March 2022 in his LinkedIn article “My List of Good Strong MFA.”

MFA Hardware Keys And Smart Cards

Hardware keys, like Yubikey, are less hackable forms of MFA. Instead of a generated code that you enter, you press a button on your hardware key to authenticate. The hardware key has a unique code that is used to generate codes to confirm your identity as a second factor of authentication.

There are two caveats for hardware keys:

  • Your app needs to support hardware keys.
  • You can lose or damage your hardware key. Many services do allow you to configure more than one hardware key. If you lose the use of one, you can use the spare.

Smart cards are another form of MFA with similar phishing resistance. We won’t get into the details here as they seem to be less likely to be used for Bitcoin or Lightning-related MFA.

Mobile: Restricted Spaces Require Hardware Devices

Another consideration for multi-factor authentication is whether you would ever be in a situation where you need MFA and cannot use a cell phone or smartphone.

There are two big reasons this could happen for bitcoin users:

  • Low or no cell coverage
  • You don’t have or can’t use a smartphone

There can be other restrictions on cell phone use due to customer-facing work environments or personal preference. Call centers, K-12 schools or high-security environments like research and development labs are some areas where phones are restricted and you would therefore be unable to use your phone authenticator app.

In these special cases where you are using a computer and don’t have a smartphone, you would then need a smart card or hardware key for MFA. You would also need your application to support these hardware options.

Also, if you cannot use your cellphone at work, how are you supposed to stack sats in the restroom on your break?

Toward More Resilient MFA

MFA can be hacked and your accounts can be compromised. However, you can better protect yourself with more resilient and phishing-resistant MFA. You can also choose MFA that is not tied to your phone number and has an adequate back-up mechanism or ability to have a spare key.

Ongoing defense against cyber attacks is a continuing game of cat-and-mouse, or whack-a-mole. Your goal should be to become less hackable and less trackable.

Additional Resources:

  • “Multi-Factor Authentication”
  • “Digital Identity Guidelines”
  • “Don’t Use Easily Phishable MFA and That’s Most MFA”
  • “Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant”
  • “Best practices for securing mobile-restricted environments with MFA”

This is a guest post by Heidi Porter. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc. or Bitcoin Magazine.

Read Entire Article
Tags: bitcoinMagzineCryptocurrencyInvestmentMining Bitcoin
Share76Tweet47

Related Posts

Bitcoin derivatives data shows room for BTC price to move higher this week

by Jon Hartney
January 23, 2023
0

BTC options data suggest that the Bitcoin price rally still has legs, even with wider economic concerns growing and the

Bitcoin price consolidation opens the door for APE, MANA, AAVE and FIL to move higher

by Jon Hartney
January 22, 2023
0

BTC could take a break from its sharp rally and if BTC price bounces off underlying support, APE, MANA, AAVE...

Genesis bankruptcy case scheduled for first hearing

by Jon Hartney
January 22, 2023
0

The first hearing in Genesis Capital's bankruptcy case will be held on January 23, according to court filings

Terra lending protocol Mars to launch mainnet

by Jon Hartney
January 22, 2023
0

The Mars Hub will launch an independent Cosmos application chain and issue MARS to users who hold the token during...

Central African Republic eyes legal framework for crypto adoption

by Jon Hartney
January 22, 2023
0

A 15-member committee is tasked with working on a legal framework that will allow cryptocurrencies to operate in

Load More
  • Trending
  • Comments
  • Latest

Ethereum Classic gets ‘endorsement’ from Vitalik Buterin, but ETC price still risks 50% crash

July 27, 2022

Critique on Helium’s $6.5K monthly revenue causes a stir

July 28, 2022

How To Buy Bitcoin Anonymously: A Privacy & Security Guide

October 25, 2022

Bitcoin price rises above $19.6K as US dollar strength falls to 3-week lows

October 25, 2022

All aboard! Elon Musk’s Vegas Loop now taking Dogecoin payments

0

Crypto owners banned from working on US Government crypto policies

0

Korean startup Uprise lost $20M shorting LUNC

0

Ethereum testnet Merge mostly successful — ‘Hiccups will not delay the Merge.’

0

Bitcoin derivatives data shows room for BTC price to move higher this week

January 23, 2023

Bitcoin price consolidation opens the door for APE, MANA, AAVE and FIL to move higher

January 22, 2023

Genesis bankruptcy case scheduled for first hearing

January 22, 2023

Terra lending protocol Mars to launch mainnet

January 22, 2023

XBT.Market

This website is an automated news feed powered by the Nebulome cloud system. The site is made possible by YYC TECH Consulting and Alberta Digital Mining Company. As a team with major crypto and bitcoin enthusiasm, we have curated major sources of news, trading and financial data to bring you, our viewer, an unbiased source of truth.

Recent Posts

  • Bitcoin derivatives data shows room for BTC price to move higher this week January 23, 2023
  • Bitcoin price consolidation opens the door for APE, MANA, AAVE and FIL to move higher January 22, 2023
  • Genesis bankruptcy case scheduled for first hearing January 22, 2023
  • Terra lending protocol Mars to launch mainnet January 22, 2023
  • Central African Republic eyes legal framework for crypto adoption January 22, 2023

News Categories

  • Bitcoin
  • Blockchain
  • Business
  • Market

Tags

bitcoinMagzine Cointelegraph Cryptocurrency insidebitcoins Investment Mining Bitcoin NewsBTC

Quicklinks

  • Home
  • Coins MarketCap
  • Crypto Exchanges
  • Crypto Calculator
  • Top Gainers and Loser
  • News
  • Contact Us

© 2022 Xbt.Market - Powered by YYC Tech Consulting & ADMCO.

No Result
View All Result
  • Home
  • Coins MarketCap
  • Crypto Exchanges
  • Crypto Calculator
  • Top Gainers and Loser
  • News
  • Contact Us

© 2022 Xbt.Market by Nebulome.

  • bitcoinBitcoin(BTC)$26,963.00-2.70%
  • ethereumEthereum(ETH)$1,861.00-2.18%
  • USDEXUSDEX(USDEX)$1.07-0.53%
  • tetherTether(USDT)$1.000.05%
  • binancecoinBNB(BNB)$305.71-2.02%
  • usd-coinUSD Coin(USDC)$1.000.03%
  • rippleXRP(XRP)$0.50-2.72%
  • cardanoCardano(ADA)$0.371477-1.86%
  • Lido Staked EtherLido Staked Ether(STETH)$1,860.23-2.17%
  • dogecoinDogecoin(DOGE)$0.071268-1.52%
  • matic-networkPolygon(MATIC)$0.89-1.13%
  • SolanaSolana(SOL)$20.53-2.72%
  • tronTRON(TRX)$0.075656-1.02%
  • polkadotPolkadot(DOT)$5.28-2.96%
  • litecoinLitecoin(LTC)$89.07-3.26%
  • Binance USDBinance USD(BUSD)$1.00-0.11%
  • Shiba InuShiba Inu(SHIB)$0.000008-4.16%
  • AvalancheAvalanche(AVAX)$14.06-2.85%
  • daiDai(DAI)$1.00-0.02%
  • wrapped-bitcoinWrapped Bitcoin(WBTC)$27,001.00-2.67%
  • UniswapUniswap(UNI)$5.02-2.12%
  • chainlinkChainlink(LINK)$6.45-1.94%
  • leo-tokenLEO Token(LEO)$3.510.10%
  • cosmosCosmos Hub(ATOM)$10.45-3.44%
  • OKBOKB(OKB)$45.52-3.32%
  • ToncoinToncoin(TON)$1.85-0.78%
  • moneroMonero(XMR)$146.77-4.52%
  • ethereum-classicEthereum Classic(ETC)$17.91-2.07%
  • Aerarium FiAerarium Fi(AERA)$7.14-13.09%
  • stellarStellar(XLM)$0.0903780.68%
  • bitcoin-cashBitcoin Cash(BCH)$112.31-2.02%
  • true-usdTrueUSD(TUSD)$1.00-0.10%
  • Internet ComputerInternet Computer(ICP)$4.64-4.28%
  • filecoinFilecoin(FIL)$4.65-3.29%
  • Lido DAOLido DAO(LDO)$2.09-4.33%
  • QuantQuant(QNT)$115.071.73%
  • AptosAptos(APT)$8.23-3.16%
  • HederaHedera(HBAR)$0.051244-3.33%
  • CronosCronos(CRO)$0.059510-1.06%
  • vechainVeChain(VET)$0.020325-2.46%
  • ArbitrumArbitrum(ARB)$1.15-7.08%
  • NEAR ProtocolNEAR Protocol(NEAR)$1.56-3.57%
  • GGTKNGGTKN(GGTKN)$0.1161257.38%
  • The GraphThe Graph(GRT)$0.1326431.33%
  • ApeCoinApeCoin(APE)$3.13-2.25%
  • algorandAlgorand(ALGO)$0.146646-2.98%
  • paxos-standardPax Dollar(USDP)$1.000.06%
  • FraxFrax(FRAX)$1.00-0.09%
  • EdgecoinEdgecoin(EDGT)$1.000.16%
  • The SandboxThe Sandbox(SAND)$0.53-3.96%
  • eosEOS(EOS)$0.88-3.30%
  • Rocket PoolRocket Pool(RPL)$48.05-2.95%
  • MultiversXMultiversX(EGLD)$36.43-0.98%
  • AaveAave(AAVE)$63.83-4.04%
  • RenderRender(RNDR)$2.45-6.20%
  • OptimismOptimism(OP)$1.37-6.33%
  • FantomFantom(FTM)$0.311625-4.56%
  • decentralandDecentraland(MANA)$0.459805-4.32%
  • tezosTezos(XTZ)$0.89-4.37%
  • theta-tokenTheta Network(THETA)$0.83-4.64%
  • StacksStacks(STX)$0.59-6.13%
  • Rocket Pool ETHRocket Pool ETH(RETH)$1,997.61-2.16%
  • Axie InfinityAxie Infinity(AXS)$6.83-3.01%
  • FlowFlow(FLOW)$0.72-4.60%
  • USDDUSDD(USDD)$1.000.03%
  • havvenSynthetix Network(SNX)$2.31-3.86%
  • neoNEO(NEO)$10.35-4.06%
  • BitDAOBitDAO(BIT)$0.50-2.14%
  • ImmutableXImmutableX(IMX)$0.72-7.32%
  • kucoin-sharesKuCoin(KCS)$7.36-1.73%
  • WhiteBIT TokenWhiteBIT Token(WBT)$4.85-0.98%
  • GALAGALA(GALA)$0.028970-3.54%
  • RadixRadix(XRD)$0.066482-5.21%
  • Curve DAOCurve DAO(CRV)$0.81-3.00%
  • Bitget TokenBitget Token(BGB)$0.453167-1.37%
  • GateGate(GT)$4.55-6.65%
  • bitcoin-cash-svBitcoin SV(BSV)$32.46-4.92%
  • CloutContractsCloutContracts(CCS)$52.461,000.00%
  • ConfluxConflux(CFX)$0.279279-12.16%
  • InjectiveInjective(INJ)$7.15-4.39%
  • gemini-dollarGemini Dollar(GUSD)$1.00-0.49%
  • KlaytnKlaytn(KLAY)$0.184825-3.64%
  • makerMaker(MKR)$634.98-0.76%
  • KavaKava(KAVA)$1.04-6.17%
  • BitTorrentBitTorrent(BTT)$0.000001-1.98%
  • iotaIOTA(MIOTA)$0.196411-6.41%
  • Casper NetworkCasper Network(CSPR)$0.047816-0.56%
  • ChilizChiliz(CHZ)$0.098464-2.36%
  • PAX GoldPAX Gold(PAXG)$1,975.700.07%
  • SuiSui(SUI)$0.97-3.69%
  • PepePepe(PEPE)$0.000001-11.99%
  • Tokenize XchangeTokenize Xchange(TKX)$6.33-2.10%
  • Terra Luna ClassicTerra Luna Classic(LUNC)$0.000084-2.75%
  • huobi-tokenHuobi(HT)$3.03-4.39%
  • Mina ProtocolMina Protocol(MINA)$0.54-5.12%
  • marumaruNFTmarumaruNFT(MARU)$0.24425729.38%
  • Tether GoldTether Gold(XAUT)$1,964.390.19%
  • cETHcETH(CETH)$37.30-2.30%
  • XDC NetworkXDC Network(XDC)$0.0344559.91%
  • Frax ShareFrax Share(FXS)$6.52-2.03%