Replacing Passwords with Multiple Factors - Email, OTP, and Hardware Keys
EuroPython Conference via YouTube
Overview
Syllabus
Introduction
Average time to detect an attack
What kind of information is at risk
No medical data was stolen
This is just one attack
Have I beenpwned
The answer is most likely
The problem with these breaches
Financial loss
Why
Usually authentication methods
Bad security and bad usability
Bad passwords
Unprotected passwords
Phishing
The line of death
Wall of death
Usability
Password managers
Limiting failed login attempts
Changing passwords often
Security questions
A clever attacker
The industry has rallied behind
You know this idea
Users will leave
User hostile
New approaches
Email
Emailbased authentication
Problems with emailbased authentication
Problems with SMSbased authentication
SMS7 flaw
Authentication is deprecated
Onetime passwords OTP
Google Authenticator
Linode
Security
Hardware keys
U2F
Applicationspecific keys
Security and usability
Google study
Browser support
Issues with hardware keys
Biometric authentication
Multifactor authentication
Why now
Apply pressure
Require multifactor authentication
Specific implementations
Django No Password
Django Rest
Django OTP
Django U2F
Run server
Add physical key
Backup codes
OTP device
One password
Onetime password
OTP device link
Logging out
Conclusion
Taught by
EuroPython Conference