Pages:
Author

Topic: 2FA - Important Precautions with Google Authenticator (Read 1175 times)

member
Activity: 295
Merit: 28
Enterapp
That's right, the authenticator code works when logging into a platform and when processing withdrawal transactions from main account to the platform we are going to, be it an investment or trading account. and if it's gone like the case you said there must be a way out, namely confirmation on the relevant platform and directed to their technical team and just follow it to reset again. But if you are proficient, it is normal and back it up. so just re-enter the 2fa code.
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
Quote from: Google Authenticator Security Risk
Google Authenticator's cloud sync feature is not end-to-end encrypted, and poses a high security risk if you use it.

🔑 Google Authenticator stores your private keys used to generate one-time codes every 30 seconds, and is used for two-factor authentication.

☁️ When the cloud sync feature is turned on, Google backs up your private keys without encrypting them behind an additional passphrase.

💥 This means that a malicious attack on your Google account will not only leave your passwords vulnerable, but your private key too.

💻 This allows hackers to log in to all your accounts with two-factor verification.
https://www.pcworld.com/article/1800132/google-authenticator-finally-got-cloud-backups-for-2fa-secrets-but-you-should-hold-off.html
🔒 Strongly recommend turning off the cloud sync feature.

1) On your device, open the Google Authenticator app.
2) Tap your profile photo.
3) Hit Use without an account.
4) Tap Continue.

I am unable to comprehend the suggestion to disable the cloud synchronization functionality.

Google authenticator now has a cloud sync feature.
Many people are telling it is not safe, including binance.

My suggestion is that you move your keys to another authenticator,  such as aegis
hero member
Activity: 2464
Merit: 519
Quote from: Google Authenticator Security Risk
Google Authenticator's cloud sync feature is not end-to-end encrypted, and poses a high security risk if you use it.

🔑 Google Authenticator stores your private keys used to generate one-time codes every 30 seconds, and is used for two-factor authentication.

☁️ When the cloud sync feature is turned on, Google backs up your private keys without encrypting them behind an additional passphrase.

💥 This means that a malicious attack on your Google account will not only leave your passwords vulnerable, but your private key too.

💻 This allows hackers to log in to all your accounts with two-factor verification.
https://www.pcworld.com/article/1800132/google-authenticator-finally-got-cloud-backups-for-2fa-secrets-but-you-should-hold-off.html
🔒 Strongly recommend turning off the cloud sync feature.

1) On your device, open the Google Authenticator app.
2) Tap your profile photo.
3) Hit Use without an account.
4) Tap Continue.

I am unable to comprehend the suggestion to disable the cloud synchronization functionality.
legendary
Activity: 1722
Merit: 2213
Ever wondered why banks use vaults and time-consuming multi-login procedures, why cold storage exists etc? For me it's the same principles that apply here. But again this is just me who likes to secure my personal data with banking level security, as I do with cryptoassets. I don't feel the values are so different to me at least.

You were saying that centralized services were insecure, now "banking level security" is the best standard?
"Banking level security" is a cloud. There is no cold storage. (maybe in a few banks, but not most of them)

You just need an email and password and that is it. Sometimes a SMS or something like that through mobile, which is far less secure than 2FA or cold storage.

I mean banking in the conceptual sense, "to bank something". In this sense a keybank, similar to a sperm bank or blood bank (ignoring the securities or said examples as unrelated). Nothing to do with financial institutions known confusingly and generically as "banks". Banking your data and private information as you would bank your bitcoin: securely and through ownership. Some call it self-banking, but it's still banking. Apologies for the confusion through use of words.

Quote from: "To bank something" from a dictionary
A bank of something, such as blood or human organs for medical use, is a place that stores these things for later use.

Source: https://dictionary.cambridge.org/dictionary/english/bank#cald4-1-5
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
Ever wondered why banks use vaults and time-consuming multi-login procedures, why cold storage exists etc? For me it's the same principles that apply here. But again this is just me who likes to secure my personal data with banking level security, as I do with cryptoassets. I don't feel the values are so different to me at least.

You were saying that centralized services were insecure, now "banking level security" is the best standard?
"Banking level security" is a cloud. There is no cold storage. (maybe in a few banks, but not most of them)

You just need an email and password and that is it. Sometimes a SMS or something like that through mobile, which is far less secure than 2FA or cold storage.
legendary
Activity: 1722
Merit: 2213
If someone has hacked your shitty corporate cloud account and got your keys in the process, you can be sure they've probably already used your credentials to change your phone number to another sim or simply access your emails Roll Eyes
No, you cannot login anywhere with only the 2FA code. They also need your password to login. So the hacker will need to hack my e-mail and authy.

Hang on, real world scenario here based on the "average" user that only bothers with crap "convenient" security.

  • Either the user uses the same password for everything and never changes it, they were pwned years ago and don't even realise it.
  • The user is smarter and uses a different password for each login, but obviously can't remember them all, so they are backed up in a cloud. .

The first user is a small snack for hackers and phishers, the second user is smarter but their 2fa is still backed up in "the cloud", and therefore likely so are their unique passwords.
Consider the second user when their cloud gets hacked a full course meal compared to snacking on dumb users that haven't changed a password once in their life.

Quote
You don't own your phone number or email address, but you can own private keys. End rant.
Backing up the private key for dozens of different services is a pain in the ass. If you back it up in a computer, or in a cloud service, it is the same to use authy. If you print everything... man, thats just crazy imo.
Security must be convenient. Excess security will lead to low security in long term, imo.

Each to their own, I respect your opinion but in mine if security is convenient it's because it's probably crap.
It's also overlooking the convenience of merely backing up your 2fa keyring, not necessarily each individual key one by one. It's far from a pain in the ass imo.
This mentality for me is part of the "yale lock theory". A small analogy to follow here.

Security has nothing to with centralization imo. Google 2FA is secure. It is so secure that even you may be unable to login in your account forever if you lose your phone and you didn't back up the key.

Yes this is the sort of security I like. If you don't have the key, you don't have access to my data. Period.
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
If someone has hacked your shitty corporate cloud account and got your keys in the process, you can be sure they've probably already used your credentials to change your phone number to another sim or simply access your emails Roll Eyes
No, you cannot login anywhere with only the 2FA code. They also need your password to login. So the hacker will need to hack my e-mail and authy.

Quote
You don't own your phone number or email address, but you can own private keys. End rant.
Backing up the private key for dozens of different services is a pain in the ass. If you back it up in a computer, or in a cloud service, it is the same to use authy. If you print everything... man, thats just crazy imo.
Security must be convenient. Excess security will lead to low security in long term, imo.

Quote
People need to stop trusting this spof centralized server backup bullshit business if they care about their op sec.
I definitely agree with the sentiment of avoiding Google-owned 2FA software, that sounds like an awful idea for your security measures.

Security has nothing to with centralization imo. Google 2FA is secure. It is so secure that even you may be unable to login in your account forever if you lose your phone and you didn't back up the key.
legendary
Activity: 1722
Merit: 2213
An excellent alternative to GA is Authy app. This program works just like GA, but it saves your access accounts. That way, if you lose your cell phone, that's okay, as your data is backed up in the cloud.

I just started using this one on my phone, had no idea it backs up your data to a cloud. That sounds tragic to be honest. I prefer the chromium extension which doesn't make copies of your totp secret keys to insecure locations (ironically almost never with 2FA!!). I much prefer to make my own offline vera-crypted backups of my keys and keyrings, rather than trust some corporate cloud to do it for me personally.  In summary relying on a form of 3fa authentication for new devices via email/phone is a senseless vulnerability.

If someone has hacked your shitty corporate cloud account and got your keys in the process, you can be sure they've probably already used your credentials to change your phone number to another sim or simply access your emails Roll Eyes I really hate this mentality, having a so-called 3rd factor "backup", effectively leaving an insecurity in your 2fa - that you can control access to if you chose to. You don't own your phone number or email address, but you can own private keys. End rant.

People need to stop trusting this spof centralized server backup bullshit business if they care about their op sec.
I definitely agree with the sentiment of avoiding Google-owned 2FA software, that sounds like an awful idea for your security measures.
hero member
Activity: 1358
Merit: 635
snip

There is a better 2fa  solution pioneered by FIDO alliance (Microsoft, Google, Yubico etc..)  who invented a special  protocol for authentication via U2F USB   sticks (currently, widely available on the market, arguably the most advanced is Yubico 5)  . It sets an extra layer of protection to your account on sites that support that technique. Google services support it and as far as I know  there are a few new exchanges which brought it to bear.

This solution is really good, and is better indeed. However it has a cost (from $20 to 60), and it is not available everywhere in the world.
It´s much more expensive to ship to Brazil for example, because we have to pay additional taxes here.

I added this to the OP, as it is a really good solution for those who wants to invest an additional $20-60.

Well, If you are technically savvy guy then there is a DIY approach (with reference to detailed instruction)  that reduces the  cost involved into  U2F ownership .  The key point in that  approach is that you can  assembly (by soldering   and programming) for yourself not one but  two U2F-USB sticks, one of them to be used as the primary while the second as backup. The last is the need for extra reliability of your 2FA, therefore, cannot be overemphasized.
legendary
Activity: 2338
Merit: 10802
There are lies, damned lies and statistics. MTwain
<...>
Ledger Nano S and Blue (not Ledger Nano X though - yet) devices have the option of installing a FIDO U2F app, so effectively the Ledger device can be used in addition for these purposes. There are some drawbacks though, like the fact a firmware update will require you to log into your FIDO U2F protected account, remove the method of authentication, and re-associate it. That may be rather a drag, since firmware should kind of be kept up-to-date.

See: https://support.ledger.com/hc/en-us/articles/115005198545-FIDO-U2F

Trezor seems to have it too: https://wiki.trezor.io/User_manual:Two-factor_Authentication_with_U2F
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
snip

There is a better 2fa  solution pioneered by FIDO alliance (Microsoft, Google, Yubico etc..)  who invented a special  protocol for authentication via U2F USB   sticks (currently, widely available on the market, arguably the most advanced is Yubico 5)  . It sets an extra layer of protection to your account on sites that support that technique. Google services support it and as far as I know  there are a few new exchanges which brought it to bear.

This solution is really good, and is better indeed. However it has a cost (from $20 to 60), and it is not available everywhere in the world.
It´s much more expensive to ship to Brazil for example, because we have to pay additional taxes here.

I added this to the OP, as it is a really good solution for those who wants to invest an additional $20-60.
full member
Activity: 924
Merit: 221
I have two mobile. One for normal using and one for google authenticator - this one is still offline and without internet. This is a godd queue from me, stay safe guys.
Good that you have overlook this one because this really a pain to a user using the 2fa google authenticator. As the phone using the 2fa gets lost you will also lost your account and will not be able to access it anymore. This is one disadvantage on using a 2FA authenticator once you losses your phone then you will also lose your account. But, there are good authenticator too and that is by using email address to which code will be sent through email address you link for the account.
hero member
Activity: 1358
Merit: 635
snip

There is a better 2fa  solution pioneered by FIDO alliance (Microsoft, Google, Yubico etc..)  who invented a special  protocol for authentication via U2F USB   sticks (currently, widely available on the market, arguably the most advanced is Yubico 5)  . It sets an extra layer of protection to your account on sites that support that technique. Google services support it and as far as I know  there are a few new exchanges which brought it to bear.
hero member
Activity: 2268
Merit: 669
Bitcoin Casino Est. 2013
That's an excellent solution.
The only downside is that you need to be extra careful with those 2fakeys, as if they are stolen you may lose money
You are right. I also have a back up of 2FA keys myself. I also use two authenticators and that is google authenticator which doesn't have a feature of backing up secret keys so I also use authy that has a feature that you can back up your secret keys and for further security or back up that is why I also write it down.
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
I already have a long printed list of 2FA keys and the list is encrypted with a password. In case I need recovery, all I have to do is scan the QR-coded encrypted key and then decrypt with the password. And then import into whatever 2FA app available to me.

That's an excellent solution.
The only downside is that you need to be extra careful with those 2fakeys, as if they are stolen you may lose money
sr. member
Activity: 859
Merit: 251
I already have a long printed list of 2FA keys and the list is encrypted with a password. In case I need recovery, all I have to do is scan the QR-coded encrypted key and then decrypt with the password. And then import into whatever 2FA app available to me.
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
Authy enables you to have an encrypted  backup of your 2FA on the cloud, and install it on multiple devices sharing the same access codes. That for me is a deal breaker in relation to Google Authenticator.[/i]


For me too.
I think Google authenticator should at least  warn its users about the limitations and the risks involved when you lose your device and didn't backed up the keys properly.

Maybe it's time for GA to inovate itself. Competition is always good, and Authy is the best option by far, without good competitors.
jr. member
Activity: 518
Merit: 1
So if you use GA it is worth taking at least one of these two precautions:
-You should always note the key when registering an 2FA account. Few people realize, but there is always a sequence of numbers below the QR code (or somewhere else on the website) when you register that account on your GA.
- Register the account on another device, such as a tablet.
It is a great advice, I have a colleague who had problems with his Google Authenticator and he was unable to recover his account. It is terrible to discover that you can have trouble like this one.
full member
Activity: 686
Merit: 125
Definitely OP, I do not even recommend Google Authenticator in securing account. Gmail has already its own 2FA and there were different types on how to enable 2FA to access gmail account which is more way better. As stated above if one will going to lose his Smartphone then definitely it will be a pain to access your own account unless you just use the 2FA which gmail has feature to all gmail account holder. Besides, other accounts has offer the same way 2FA so better check all the settings if you created an account and then look for 2FA if available.
jr. member
Activity: 168
Merit: 2
What if I didn't saved or copied the sequence of numbers before enabling the 2FA in any account?

Is there a possible way to review it again? Cause I don't want to use Authy due to some possible hacking intrusion issues. Huh
If you do not back up that number you can hardly recover if you lose or break your phone. If you have not saved then you can disable 2FA in your account and reset.
Pages:
Jump to: