summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNicholas Johnson <nick@nicksphere.ch>2022-08-04 00:00:00 +0000
committerNicholas Johnson <nick@nicksphere.ch>2022-08-04 00:00:00 +0000
commit05d0a78be66567eb29a2249eb71cb472e09c060472a980c8b1dbf614332f98ba (patch)
tree7596344079b81c94b38458bdaee8dc99f75bd99ed91e3333b2c2d1037c3f1a4f
parent5d560a57d73b61afdca64816f21c4cdef45b3501fb16a5de846d94100fa5e1d6 (diff)
downloadjournal-05d0a78be66567eb29a2249eb71cb472e09c060472a980c8b1dbf614332f98ba.tar.gz
journal-05d0a78be66567eb29a2249eb71cb472e09c060472a980c8b1dbf614332f98ba.zip
New entry: comparing-multi-factor-authentication-methods
-rw-r--r--content/entry/comparing-multi-factor-authentication-methods.md35
1 files changed, 35 insertions, 0 deletions
diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md
new file mode 100644
index 0000000..7d28c4d
--- /dev/null
+++ b/content/entry/comparing-multi-factor-authentication-methods.md
@@ -0,0 +1,35 @@
+---
+title: "Comparing Multi-Factor Authentication Methods"
+date: 2022-08-05T00:00:00
+draft: false
+---
+# Comparing Multi-Factor Authentication Methods
+I made a nice little chart comparing multi-factor authentication[1] methods from a user standpoint. Despite some of the information in the chart being slightly subjective and depending on one's threat model, I still think it's useful. So here it is:
+
+## Multi-Factor Authentication Chart
+```chart comparing multi-factor authentication methods
++----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+
+| Authentication | AI-Based | Biometric | Email Token | Hardware | Security | Text Codes | Time-Based |
+| Methods | | | | Security Key | Questions | | One-Time Password |
++----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+
+| Security | strong | strong | fair | strong | weak | weak | strong |
++----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+
+| Personal Data | behavior | fingerprint, | email | none | personal life | phone | none |
+| Exposure | patterns, | signature, | address | | details | number | |
+| | device info, | iris scan, | | | | | |
+| | access time, | etc. | | | | | |
+| | location, etc. | | | | | | |
++----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+
+| Pitfalls | can block | can be stolen | can be | easy to lose | can be | can be | must be updated |
+| | user access | or legally | intercepted | | discovered | intercepted | if the online |
+| | by accident | coerced by | in transit | | by information | via SIM | service is |
+| | | law enforcement | | | gathering | swapping | compromised |
++----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+
+```
+
+## Conclusion
+In terms of security, any of these options is better than nothing. But if you want maximum security with the least personal data exposure, just go with hardware security keys or time-based one-time passwords. Other authentication methods are either not very secure or they collect personal information.
+
+
+Links:
+[1: Multi-Factor Authentication](https://wikiless.org/wiki/Two-factor_authentication)