{"video_id":"07mRDyydCNY","title":"Multi-factor Authentication as Fast As Possible","channel":"Techquickie","show":"Techquickie","published_at":"2015-05-07T14:58:16Z","duration_s":275,"segments":[{"start_s":0.16,"end_s":6.56,"text":"multiactor authentication or MFA is an approach to predicting your logging","speaker":null,"is_sponsor":0},{"start_s":4.759,"end_s":12.719,"text":"credentials that requires the presentation of two or more of the three","speaker":null,"is_sponsor":0},{"start_s":10.16,"end_s":17.48,"text":"independent authentication factors a knowledge Factor something only the user","speaker":null,"is_sponsor":0},{"start_s":14.719,"end_s":23.119,"text":"knows a possession Factor something only the user has and an inherence Factor","speaker":null,"is_sponsor":0},{"start_s":20.6,"end_s":26.0,"text":"something only the user is the most popular form of multifactor","speaker":null,"is_sponsor":0},{"start_s":24.4,"end_s":30.56,"text":"authentication is two-factor authentication which is used by online","speaker":null,"is_sponsor":0},{"start_s":27.84,"end_s":34.32,"text":"services like Gmail and steam the three factors are pretty clearly","speaker":null,"is_sponsor":0},{"start_s":32.239,"end_s":38.84,"text":"defined knowledge factors include PIN codes personal questions like your","speaker":null,"is_sponsor":0},{"start_s":35.96,"end_s":43.559,"text":"mother's maiden name passwords and swipe tap or knock patterns like those on","speaker":null,"is_sponsor":0},{"start_s":41.36,"end_s":48.559,"text":"smartphone lock screens possession factors are physical items like an","speaker":null,"is_sponsor":0},{"start_s":46.079,"end_s":52.84,"text":"identification card that you would swipe to access secure areas of a building or","speaker":null,"is_sponsor":0},{"start_s":50.84,"end_s":56.239,"text":"a USB drive with an encryption key on it that decrypts a protected folder on a","speaker":null,"is_sponsor":0},{"start_s":54.52,"end_s":60.16,"text":"computer though for the most part possession factors are being eliminated","speaker":null,"is_sponsor":0},{"start_s":58.079,"end_s":65.08,"text":"and replaced by smartphone Fe features and apps making your smartphone your","speaker":null,"is_sponsor":0},{"start_s":62.039,"end_s":67.88,"text":"possession Factor inherence factors are","speaker":null,"is_sponsor":0},{"start_s":65.08,"end_s":70.92,"text":"also known as biometric identifiers there are relatively new form of","speaker":null,"is_sponsor":0},{"start_s":69.4,"end_s":75.2,"text":"authentication and include face recognition fingerprint scans voice","speaker":null,"is_sponsor":0},{"start_s":73.08,"end_s":79.56,"text":"prints and the ever popular sci-fi friendly Iris and retinal scans now","speaker":null,"is_sponsor":0},{"start_s":78.08,"end_s":82.88,"text":"there's no doubt that biometric authentication factors are super cool","speaker":null,"is_sponsor":0},{"start_s":81.64,"end_s":86.84,"text":"and while they're quickly being pushed into the mainstream they're also meeting","speaker":null,"is_sponsor":0},{"start_s":84.88,"end_s":91.6,"text":"a fair bit of resistance and for good reason one issue is that biometric","speaker":null,"is_sponsor":0},{"start_s":89.079,"end_s":96.399,"text":"information can be easily repeated once compromised and a second is that many","speaker":null,"is_sponsor":0},{"start_s":94.32,"end_s":100.479,"text":"individuals object to having their biometric information tracked and stored","speaker":null,"is_sponsor":0},{"start_s":98.36,"end_s":104.719,"text":"in a database somewhere which seems like a fairly valid concern given the amount","speaker":null,"is_sponsor":0},{"start_s":102.24,"end_s":108.6,"text":"of secure data that gets compromised on a daily basis and that unlike a password","speaker":null,"is_sponsor":0},{"start_s":107.24,"end_s":115.0,"text":"you can't run around changing your fingerprints or retinas at least not yet","speaker":null,"is_sponsor":0},{"start_s":112.36,"end_s":119.24,"text":"so that's what it is but what is it for well better security logging in by","speaker":null,"is_sponsor":0},{"start_s":117.2,"end_s":123.2,"text":"combining a knowledge Factor like your password with a possession Factor like a","speaker":null,"is_sponsor":0},{"start_s":121.56,"end_s":128.039,"text":"physical key or a code sent to your smartphone makes your account much more","speaker":null,"is_sponsor":0},{"start_s":125.96,"end_s":132.08,"text":"difficult to Target for online attacks let's take Gmail's two Factor","speaker":null,"is_sponsor":0},{"start_s":129.64,"end_s":136.76,"text":"authentication as an example even if a wannabe account hijacker obtains your","speaker":null,"is_sponsor":0},{"start_s":134.239,"end_s":141.48,"text":"password with a key logger or a security question exploit Google will require the","speaker":null,"is_sponsor":0},{"start_s":139.519,"end_s":145.44,"text":"entry of a six-digit code that they send to you that must be entered within a","speaker":null,"is_sponsor":0},{"start_s":143.2,"end_s":150.04,"text":"couple minutes something that hijacker can't get without your smartphone and on","speaker":null,"is_sponsor":0},{"start_s":148.08,"end_s":153.92,"text":"top of that and we're continuing the GMA example here once someone tries to log","speaker":null,"is_sponsor":0},{"start_s":152.2,"end_s":158.04,"text":"in with the correct password that notification will go straight to you and","speaker":null,"is_sponsor":0},{"start_s":156.08,"end_s":161.84,"text":"you'll immediately know that someone is trying to access your account without","speaker":null,"is_sponsor":0},{"start_s":159.76,"end_s":165.84,"text":"your permission and also that it's probably time to re-evaluate your","speaker":null,"is_sponsor":0},{"start_s":164.0,"end_s":169.879,"text":"extremely secure password of gayen is love gab Ben his life now there are a","speaker":null,"is_sponsor":0},{"start_s":168.239,"end_s":173.92,"text":"few reasons why people don't use multiactor authentication some Services","speaker":null,"is_sponsor":0},{"start_s":171.92,"end_s":178.239,"text":"don't support it some people share accounts with a couple or a business","speaker":null,"is_sponsor":0},{"start_s":175.76,"end_s":182.0,"text":"partner so they can't both have the same smartphone at the same time to use it","speaker":null,"is_sponsor":0},{"start_s":180.04,"end_s":187.319,"text":"and then some people just plain can't be ared to add another step to their login","speaker":null,"is_sponsor":0},{"start_s":184.12,"end_s":189.44,"text":"process but if you truly care about","speaker":null,"is_sponsor":0},{"start_s":187.319,"end_s":193.799,"text":"keeping your personal data private from prying eyes aside from those with a","speaker":null,"is_sponsor":0},{"start_s":191.519,"end_s":197.519,"text":"warrant that is then the message here is that it's worth the effort if the","speaker":null,"is_sponsor":0},{"start_s":195.72,"end_s":200.92,"text":"service doesn't support it maybe you should find one that does if you share","speaker":null,"is_sponsor":0},{"start_s":199.4,"end_s":206.08,"text":"an email account with your significant other or business partner just get your","speaker":null,"is_sponsor":0},{"start_s":203.159,"end_s":209.879,"text":"own email they aren't exactly expensive and if you simply don't care well then I","speaker":null,"is_sponsor":0},{"start_s":208.239,"end_s":214.36,"text":"think you're underestimating what someone with access to your accounts can","speaker":null,"is_sponsor":0},{"start_s":211.92,"end_s":218.12,"text":"do to you I've been key logged before and multiactor authentication on one of","speaker":null,"is_sponsor":0},{"start_s":216.239,"end_s":223.239,"text":"my accounts was the only thing that kept me from losing other ones speaking of","speaker":null,"is_sponsor":0},{"start_s":221.159,"end_s":227.68,"text":"things that you should use multiactor authentication on your linda.com account","speaker":null,"is_sponsor":0},{"start_s":225.799,"end_s":231.28,"text":"because knowledge is the most valuable of all resources and you need to protect","speaker":null,"is_sponsor":0},{"start_s":229.599,"end_s":235.56,"text":"it well maybe I'm being a little bit melodramatic but linda.com is an amazing","speaker":null,"is_sponsor":0},{"start_s":233.879,"end_s":239.28,"text":"resource with thousands of great courses available in their Library you can learn","speaker":null,"is_sponsor":0},{"start_s":237.48,"end_s":242.72,"text":"Adobe programs pick up some new photograph graphy skills learn about web","speaker":null,"is_sponsor":0},{"start_s":240.92,"end_s":247.319,"text":"design business or music production or essentially whatever you want to do","speaker":null,"is_sponsor":0},{"start_s":245.0,"end_s":250.76,"text":"online head over to linda.com and check it out their courses are taught by","speaker":null,"is_sponsor":0},{"start_s":248.879,"end_s":254.64,"text":"industry experts and they add new ones every week so no matter how much you may","speaker":null,"is_sponsor":0},{"start_s":252.84,"end_s":257.919,"text":"know already or learn from linda.com there's always something new to check","speaker":null,"is_sponsor":0},{"start_s":256.16,"end_s":262.4,"text":"out and best of all their service is very affordable with plans starting at","speaker":null,"is_sponsor":0},{"start_s":259.4,"end_s":263.8,"text":"only 25 bucks a month thanks linda.com","speaker":null,"is_sponsor":0},{"start_s":262.4,"end_s":267.36,"text":"for sponsoring this episode thanks you guys for watching like the video if you liked it dislike it if you disliked it","speaker":null,"is_sponsor":0},{"start_s":266.32,"end_s":271.919,"text":"leave a comment letting me know if you have suggestions for future fastest possible videos like this one and as","speaker":null,"is_sponsor":0},{"start_s":270.16,"end_s":276.479,"text":"always don't forget to subscribe to Techquickie for more videos just like this","speaker":null,"is_sponsor":0},{"start_s":273.639,"end_s":276.479,"text":"one","speaker":null,"is_sponsor":0}],"full_text":"multiactor authentication or MFA is an approach to predicting your logging credentials that requires the presentation of two or more of the three independent authentication factors a knowledge Factor something only the user knows a possession Factor something only the user has and an inherence Factor something only the user is the most popular form of multifactor authentication is two-factor authentication which is used by online services like Gmail and steam the three factors are pretty clearly defined knowledge factors include PIN codes personal questions like your mother's maiden name passwords and swipe tap or knock patterns like those on smartphone lock screens possession factors are physical items like an identification card that you would swipe to access secure areas of a building or a USB drive with an encryption key on it that decrypts a protected folder on a computer though for the most part possession factors are being eliminated and replaced by smartphone Fe features and apps making your smartphone your possession Factor inherence factors are also known as biometric identifiers there are relatively new form of authentication and include face recognition fingerprint scans voice prints and the ever popular sci-fi friendly Iris and retinal scans now there's no doubt that biometric authentication factors are super cool and while they're quickly being pushed into the mainstream they're also meeting a fair bit of resistance and for good reason one issue is that biometric information can be easily repeated once compromised and a second is that many individuals object to having their biometric information tracked and stored in a database somewhere which seems like a fairly valid concern given the amount of secure data that gets compromised on a daily basis and that unlike a password you can't run around changing your fingerprints or retinas at least not yet so that's what it is but what is it for well better security logging in by combining a knowledge Factor like your password with a possession Factor like a physical key or a code sent to your smartphone makes your account much more difficult to Target for online attacks let's take Gmail's two Factor authentication as an example even if a wannabe account hijacker obtains your password with a key logger or a security question exploit Google will require the entry of a six-digit code that they send to you that must be entered within a couple minutes something that hijacker can't get without your smartphone and on top of that and we're continuing the GMA example here once someone tries to log in with the correct password that notification will go straight to you and you'll immediately know that someone is trying to access your account without your permission and also that it's probably time to re-evaluate your extremely secure password of gayen is love gab Ben his life now there are a few reasons why people don't use multiactor authentication some Services don't support it some people share accounts with a couple or a business partner so they can't both have the same smartphone at the same time to use it and then some people just plain can't be ared to add another step to their login process but if you truly care about keeping your personal data private from prying eyes aside from those with a warrant that is then the message here is that it's worth the effort if the service doesn't support it maybe you should find one that does if you share an email account with your significant other or business partner just get your own email they aren't exactly expensive and if you simply don't care well then I think you're underestimating what someone with access to your accounts can do to you I've been key logged before and multiactor authentication on one of my accounts was the only thing that kept me from losing other ones speaking of things that you should use multiactor authentication on your linda.com account because knowledge is the most valuable of all resources and you need to protect it well maybe I'm being a little bit melodramatic but linda.com is an amazing resource with thousands of great courses available in their Library you can learn Adobe programs pick up some new photograph graphy skills learn about web design business or music production or essentially whatever you want to do online head over to linda.com and check it out their courses are taught by industry experts and they add new ones every week so no matter how much you may know already or learn from linda.com there's always something new to check out and best of all their service is very affordable with plans starting at only 25 bucks a month thanks linda.com for sponsoring this episode thanks you guys for watching like the video if you liked it dislike it if you disliked it leave a comment letting me know if you have suggestions for future fastest possible videos like this one and as always don't forget to subscribe to Techquickie for more videos just like this one"}