ExpressVPN Guide To Stronger Passwords – Part One (Two-Factor Authentication)


This is part one of our stronger password series. For the other parts, click the links below:

Part Two (Password Manager)
Part Three (Diceware)

ExpressVPN has written a three-part series in which we will highlight three easy ways to make your passwords more secure, and why secure passwords are important!

The first part (this one) is all about two-factor authentication. Two-factor authentication is a great way to make your accounts and services more difficult to hack, by creating a secondary password that is only valid for a short amount of time.

Part two focuses on password managers. We will present three password managers that will store your passwords and credentials securely, without you having to remember them!

In part three we’ll take a look at Diceware and explain how to create high quality and unique passwords that are easy to remember. You can use Diceware to generate a master password for your password manager, for your Bitcoin Brainwallets, or for any other account you wish to make secure.

Computers Are Terrible At Authenticating Passwords

Passwords have been around a lot longer than computers. They were used to identify messengers and soldiers, or gain access to assemblies and fortresses.

The fundamental difference between a password policy enforced by humans and one enforced by computers is that computers have a hard time taking other relevant factors into account.

For example, a computer can often not distinguish between a person or a program entering a password. Humans will judge a face, clothing, and movements before authenticating a person, but a computer cannot. And while it would surely be suspicious if a person were to randomly yell words at a guard in an attempt to guess a password, this behavior might not seem strange at all to a computer.

Computers are getting better at authenticating people, though. New systems are able to take into account the rate and rhythm at which you type your password and use additional biometric authentication, such as your fingerprint or face.

But such innovations are often only implemented for convenience and add little security. In many cases they can be bypassed or, worse, serve as a replacement to strong and secure passwords.

Protect yourself against unwanted intrusions – double up.

Why Extra Password Protection Is Important

Though most services limit the number of guesses a user can make for a password, it is possible for an attacker to guess and check every possible password for your account. This technique of password hacking is called brute forcing.

Brute force could crack a single password under fifteen numerical digits within a day. And anything under eighteen characters could still be guessed within a year. If your password contains letters and numbers, it needs to be at least ten characters to prevent it being potentially cracked within a day.

Check out the tool ‘How Secure Is My Password’ for a quick demonstration of what makes a good password. Despite their pledge to never record any of the information you enter, it’s not a good idea to actually enter any of your existing passwords. Who knows what is intercepted or recorded!

Password length is incredibly important, even more so than complexity. Luckily, securing yourself is not difficult. To comprehensively protect your accounts, files, and devices you can use one of the following three easy tools, which we are presenting to you in our three-part password series.

How To Set Up Two-Factor Authentication

Two-factor authentication means that in addition to your regular password, you need to submit a second code to log into your account. There are plenty of ways to obtain this second code. You can use a combination of any of the following, or just pick the one that best suits your needs.

Secondary Passwords By SMS

A few services will ask you for a second code every single time you log in, especially if you have never logged in from that device before. Services such as Facebook, Twitter, Google, and Dropbox will send you a text message containing this code. This code must then be entered into the website, in order for you to log in to your account.

However, for this to work your phone needs to have reception, which is something that is not always possible. If you are traveling in a country where your phone does not work, or you simply run out battery, you could end up locked out of your account just because you don’t have a working phone to hand.

If you lose your phone, this system could potentially lock you out of your account for good. But it is not too difficult to get a new SIM card with the same number. The downside of this is that an attacker could trick your mobile phone provider into issuing them a duplicate SIM. Or perhaps find a way to reroute your text messages directly to them.

Snooping governments could also be reading your text messages silently, or prevent the SMS from even reaching you (or both!). This would allow them to effectively render your SMS codes useless. At the very least your phone would give away your location while it is receiving the text message, which is something you might wish to avoid.

Generating Two-Factor Authentication Codes Via An App

Google Authenticator (here is a list of services that work with Google Authenticator) and Authy are two great examples of Apps that generate codes on your phone, instead of sending them to you via text message. Generating the codes on your phone means they are never in transit, which makes them impossible to intercept.

This process does make you more dependant on your device, though. And if it is out of battery, broken, or missing you might get locked out of your account. If you are unable to get the device running again, or you lose it, it can be a huge hassle to regain access to your Google Authenticator protected accounts.

Some authentication services will allow you to create emergency codes in such a case, which you have to store securely elsewhere (such as in an encrypted file on your computer). Other services might ask you for secondary phone number, where they can reach you in case your primary number is lost and your two-factor authentication needs to be disabled.

Generate An Aunthentication Code With A USB Stick

Instead of getting the secondary codes from your phone or a remote server, you could generate them on a dedicated USB device, such as a Yubikey. Yubikeys are small USB sticks (sometimes as small as a fingernail!) that plug into the USB slot of your computer. The Yubikey has a clickable button on its side. Pressing this button will generate a random and secure key, which can be used as a secondary password.

Yubikey is very easy to setup and many popular services, such as Facebook and Google, allow the system on their websites. The Yubikey authentication system will place a second password entry field under the primary one, and you will be asked to populate this field with a key from the Yubikey USB stick. Simply plug the Yubikey stick into your USB slot, then click the button on its side. A key will be generated and automatically submitted to the website as your secondary password.

Yubikey makes it impossible to log in without using the USB stick, and a new key is generated each time you click the button on it. As the key changes with each login, it is very hard to hack.

If you keep the Yubikey on your person, the chances of anyone else using it are slim.

Yubikey cannot be copied or forged, but does come at a cost of about 40 USD.

Protect Your Privacy With Secure Passwords

We strongly encourage you to use two-factor authentication with the services that you use the most (such as email, social media, or banking).

Nothing else will improve your online security as much, for such little effort.

Featured image: djvstock / Dollar Photo Club
Padlock image: foryouinf / Dollar Photo Club