Conversation

Reminder: SMS 2FA is still meaningful. Large scale account take over study (3.3Billion accounts): SMS Auth was effective against: 100% Automated password stuffing 96% Bulk phishing 76% Targeted attacks U2F is *even* better! Use it! Mudge & Niels: youtu.be/SOQgABDSYZE?t=
Quote Tweet
Even if the current Twitter authentication problems turn out to be something different, its a good time to re-iterate: 2FA that is based on SMS or in other ways tied to mobile phone numbers is a seriously bad idea. Phone number assignment processes were never designed for this.
23
679
I say this having the utmost respect for . He is one of the people I admire most. His comment is not wrong, but it lacks significant context. Passwords + SMS auth is far better than just passwords. If it is an option, you should use U2F which is *much* better!
5
58
I share Frank’s frustration. Weaknesses in SMS auth were foreseeable. SMS was not intended/designed for this. SS7/SIP-T attacks will become increasingly auto stable and feasible. However for the foreseeable future SMS Auth adds real cost to an attacker over passwords alone.
3
60
Replying to
Giving your phone number to a service often allows for account recovery via SMS. Adding SMS 2FA to an account can often unintentionally enable SMS-based account recovery. It's sometimes implemented strictly as a 2nd factor but also used for other purposes too.
2
3
Replying to and
The main thing that landing.google.com/advancedprotec provides is protection against hijacking your account via account recovery. It puts restriction on their support staff in addition to the technical restrictions. I wish I could enable this on more than just my Google account.
1
3
It's also rare for sites to offer accounts that cannot be hijacked via recovery through email addresses. Email security can be done right, but usually isn't. How many sites with email recovery enforce DANE and/or MTA-STS? Anyone who can MITM those connections can hijack accounts.
1
1