Hackers aren’t the only ones who can get into your phone. It could be your ex-girlfriend, boyfriend, jealous people, friends, or parents. Greg and Louis have a conversation with a hacker about privacy, security, and other mysteries. There isn’t any nonsense here. The First Thing To Do Is Define What Two-factor Authentication Is And What Its Purpose Is. Ok, So Two-factor Authentication Is A Secondary Information You Must Enter When Connecting To, Your Account. So, let’s say I go into my email account and enter my email address. I type in my password, then click 'connect,' and the server will prompt me for additional information, which is typically presented in a six-digit format and changes every 30 seconds. So I fill out this form and gain access to my account. This is done to prevent someone from gaining access to your information if your password is stolen in a mass targeted attack, such as if a database is stolen and your password is inside, or if your password is stolen by looking over your shoulder when you enter it, or by stealing your phone, etc. Depending on how you set up your two-factor authentication, You’ll get this information from an app or a physical device for authentication. Alternatively, you can use a text message for two-factor authentication. There Are Several Apps That Perform This Function; I believe the most well-known is 'google Authenticator'. Once you’ve done that, when you go to log into your account, it’ll ask you for your username and password, and then you’ll have another step to complete once you’ve entered these two pieces of information, which is to enter the number generated by the app. So you log into your app and see all of the numbers for all of the different accounts you have, and you simply copy and paste them. These numbers change every 30 seconds, so even if someone gains network access to this number, they won’t be able to use it again. It's an extra layer of security that isn't difficult or painful to implement, and it will give you a lot more protection. So I strongly advise that you set up these things all over the place. According to you, the point of two-factor authentication is that it is a very safe way to secure yourself and reduce the chances of someone hacking into your account. But, if this Authenticator App is installed on my phone and someone has access to the inside of my phone, doesn’t that imply that my two-factor authentication isn’t that secure? They’ll steal a password from someone, from a database, from a company, or from somewhere on the internet, with mass targeted attacks. As a result, if your password isn’t strong enough, or if you use the same password everywhere, you’ll be vulnerable. As a result, if you enable two-factor authentication, anyone who gains access to your password will be unable to connect. Accounts of yours In a targeted attack, however, it means I’m going after you personally, and two-factor authentication is required. Is A Little More Complicated Because If I Hack Your Phone and You Have Two-factor Authentication On Your Phone, I Will Be Able To Access Your Code, So It Isn’t Very Useful. So, if you really want to protect yourself from targeted attacks, there are a few tricks you can use. The Main Point Is To Have Your Two-Factor Authentication Set Up. Away from the Internet So Having A Device Is The Best Case Scenario. It’s a lot better because Because the device isn’t connected to anything, you can read your two-factor authentication code on it and then enter it into a computer or other internet-connected device. However, that is the best-case scenario. For instance, if you have an old phone lying around, you can use it as a smartphone. You Have the Option to Remove Remove all Wifi, Bluetooth, and other connections, and simply install the app on the old smartphone so that it is not connected to the internet, and use it as a secondary device. I strongly advise you to use an offline device for your two-factor authentication. There Are Many Different Devices: For Example, You Have 'rsa Id', Which Is Quite Good, But It Isn't Compatible With Everything. You have a yubikey, which is an offline device that you plug into your computer to use. 'yubikey' Is 40 'yubikey' Is 40 'yubikey&

Dollars, so it isn’t prohibitively expensive; in fact, you can just buy one and be much safer. The Second Point, Which I Believe We Will Discuss

But, as mentioned in another video, don’t lend your phone to others and use a strong password. It As Well As Everything Hackers aren’t the only ones who can get into your phone. It could be your ex-girlfriend, boyfriend, jealous people, friends, or parents. A LOT OF PEOPLE HAVE ASKED ME TO HACK STUFF. They Were Just Regular People, You Know, Coworkers Attempting To Hack Someone Else From The Office In Order To Gain Access To Some Information So, if you’re a normal person, the people who will come after you in general are the people who live around you. They’re more likely than anyone else to grab your phone and see you enter your password, which is why it’s so dangerous. It’s a good idea to have two-factor authentication to avoid problems like this. The Issue Is That If You Install An App, They’ll Take Your Phone. They’ll be able to access the app because they’ll have access to your phone. As a result, any protections provided by two-factor authentication will be removed in the event of a targeted attack. It is necessary for you to have it offline. So, Would You Recommend Taking This Course?

Offline Device And Physically Storing It Somewhere Else To Minimize The Is There A Chance That Someone Will Be Able To Hack Into Any Of Your Accounts? Because it will protect you very well from mass targeted attacks, use two-factor authentication on all connected devices on the internet. It isn’t going to protect you from personal targeted attacks very well. That Is Why Two-Factor Authentication Is Necessary. Is It Offline, That It Is Offline, That It Is Offline, That It Is Offline, That It Is Offline, That On Isn’t Accessing The Internet Also, keep it on you at all times, such as on your keychain or something, because if it is stolen, you will face the same problem. Moreover, The Phone Number Is Frequently Used As A Two-Factor Authentication Method. They send you an email or a text message. So, basically, there are two types of two-factor authentication that aren’t secure: email and SMS. Companies that request your phone number for security purposes so that they can send you a code to log in are not really safe, and they do so because they want to identify you more than they want to protect you. So, yes, I do.

It Isn’t Recommendable To Give It Choose Something Else if You Have the Option Don’t give your phone away because it’s a very good identifier of a person and can be used to track you down quite easily. Using An Sms On Your Phone Number As A Two-factor Authentication Code Is Also Bad Because There Are There are numerous methods for gaining access to this SMS from a distance. Email is the second item on the list. For example, people will be able to access your email account in mass targeted attacks, but not in personal targeted attacks. So having a two-factor authentication code sent to you via email isn’t going to help you much. For You, On Your Devices For example, on your phone, your email is automatically connected without the need for a passcode or anything. You only have to click on the email to get started. To Obtain Two-Factor Authentication Access So That’s Why It’s Not All That Great Whatever Happens, Two-factor Authentication Is Always Offline That Is The Most Effective Way To Stay Safe Also, you should always be focused on yourself. Set It Up Your keychain or something you carry with you all the time So, it appears that there is some sort of hierarchy in your recommendations and tips, right? Let’s say you want to know how safe you can be and how convenient it is. Because the first level is the least secure, requiring only one password to access my account, making it very easy for anyone to gain access to or hack into it. After that, you mentioned two-factor authentication. Get An Sms Or An Email, Which Means You Don't Have To Buy An Offline Device, But Which Also Means You're Less Protected, But More Protected Than If You Just Had A Password, And Then There's The Third Level, Which Is, Let's Say, You Need To Sacrifice A Little More Convenience In The Sense That You Must Carry Another Device,, And That You Must Is it possible to have, let’s say, for the average user? So you’ve got one in the middle. So the first step would be to create a password. Email or SMS will come in second. The third option is to use an authenticator app, which is a step up from SMS and passwords. As a result, SMS and Email can be accessed from a variety of locations. Authentication by the Authenticator Because the app can only be accessed from your phone, I’ll need to hack or steal it. The fourth category is Offline Devices. Like 'rsa Id', 'yubikey', Or Using An Old Smartphone With The App While Offline, Which Is Actually The Best Way To Use Two-factor Authentication Thank you once more for your help, and If you have any questions, please leave a comment below. Thank you so much, guys!