2FA: Two Factor Authentication - Computerphile

preview_player
Показать описание
Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor authentication.

This video was filmed and edited by Sean Riley.

Рекомендации по теме
Комментарии
Автор

2 factor authentification: combine a thing you can forget with a thing you can lose.

Pyrazahn
Автор

Mike Pound and Brailsford are two of the people I can listen to ad infinitum. I'd love people like them as teachers. Actually, that's exactly what they are doing right now.

YingwuUsagiri
Автор

There are actually 5 factors you can choose from:
Something you know (password)
Something you have (phone, token, whatever)
Something you are (fingerprint, iris, etc)
Somewhere you are (geolocation, proximity detection)
Somewhen you are (only on specific days/times)

The last two are rarely used, but ARE valid factors (a common thing for somewhere is being able to unlock your phone without a password as long as you're on your home wifi or within X distance of GPS coordinates).

PElder
Автор

"correcthorsebatterystaple" you say?

DKRCecer
Автор

Back in the mid 1980's when the company my partner worked for got computers in each office, someone in top management insisted they require all employees to use complex passwords, no real words were allowed and they had to be changed every week. Of course no one could remember these crazy passwords so management recommended they write them down on sticky notes and stick them on their monitors. That lasted about 3 months before some top secret government documents were stolen by someone on the cleaning crew.

cowboyfrankspersonalvideos
Автор

If you're using Unix time, Timezones shouldn't factor in, as Unix time *should* be the same no matter where you are; The "time" where you are is then calculated after that.

jeremia
Автор

I always found 2FA to be quite convinient, since it takes only bout 10 seconds to get my phone, open the app and type it in and I rarely have to do it. All the while it removes a huge security risk. Anyway that's what I thought until I lost my phone's data and had to reset everything.

ToastiLP
Автор

I love you guys! I can work under my british accent watching your videos and also get some knowledge about my passion wich is computer programming.
Keep up your fabulous work !

longingheart
Автор

I'm glad Mike sorted the ghost cube on the shelf! He's a great lecture as one of my highest grades was in his security lecture :D

alexmiszkiel
Автор

In one of the episodes, Data impersonates Picard's voice to commandeer the enterprise.

aarcaneorg
Автор

So what can I do to stop the same thing that happened to you from happening to me regarding google authenticator?

MaxMakerChannel
Автор

Thanks dude, this was very helpful, you're carrying my CS exam right now. :)

stxllr
Автор

I love that the password was "correct horse battery staple".

KaeVF
Автор

I learned so many things that my university didn't really teach me in this channel Thank you guys

glazare
Автор

Love Dr Pound! More videos with him please!

bluekeybo
Автор

for some reason i watch exclusively the videos where DR Mike is talking

Ganorthic
Автор

In StarTrek the thing to "have" is your personalized communicator. It has to be in the same room as the attemt is done from. More than once you see them tap their communicator first before they say their password. If you lost your communicator you probably can do it, but you have to "reprogram" the computer first.

MrBluemoon
Автор

meh boy mike has the most loveable facial expressions and way of speaking.. like idk its just soo nice to just watch

evenprime
Автор

"put it aside for today"

Man a biosecurity video would be so cool!

sillylittleboy
Автор

There is a problem with one version of 2 factor. A number of people have run into an issue where a hacker gets control of their phone number and then goes to various websites and clicks "reset password." Not only is the hacker in, but the original user is frozen out. Sometimes the hacker calls up the phone company, claims to work in a store and they are selling a new phone to a customer. If the operator is stupid, she may transfer the phone number to the hacker's phone.

kestrelwings