Conversation

Reminder: SMS 2FA is still meaningful. Large scale account take over study (3.3Billion accounts): SMS Auth was effective against: 100% Automated password stuffing 96% Bulk phishing 76% Targeted attacks U2F is *even* better! Use it! Mudge & Niels: youtu.be/SOQgABDSYZE?t=
Quote Tweet
Even if the current Twitter authentication problems turn out to be something different, its a good time to re-iterate: 2FA that is based on SMS or in other ways tied to mobile phone numbers is a seriously bad idea. Phone number assignment processes were never designed for this.
23
679
I say this having the utmost respect for . He is one of the people I admire most. His comment is not wrong, but it lacks significant context. Passwords + SMS auth is far better than just passwords. If it is an option, you should use U2F which is *much* better!
5
58
I share Frank’s frustration. Weaknesses in SMS auth were foreseeable. SMS was not intended/designed for this. SS7/SIP-T attacks will become increasingly auto stable and feasible. However for the foreseeable future SMS Auth adds real cost to an attacker over passwords alone.
3
60
Replying to and
Sites implementing only SMS-based 2FA (way harder to implement than U2F/FIDO2 with TOTP as another option for people without keys) are those that tend to use it for account recovery... they have people add a phone number, not strictly a phone number for 2FA authentication.
1
Replying to and
A good way to test this is to try recovering your own accounts as if you've forgotten your password. If you've given them a phone number for any reason, it's generally possibly to recover the account via SMS meaning someone hijacking your phone number can steal your account.
Replying to and
The main thing that landing.google.com/advancedprotec provides is protection against hijacking your account via account recovery. It puts restriction on their support staff in addition to the technical restrictions. I wish I could enable this on more than just my Google account.
1
3
Show replies