2FA...WTF? Watch Twilio in Action!

Not just for logging in, two-factor authentication can also secure high value transactions.

Learn More

2FA...WTF? Watch Twilio in Action!

In this presentation, recorded in 2016 at Codemotion in Amsterdam, Authy evangelist Phil Nash takes a look into generating one-time passwords, implementing two-factor authentication (2FA) in web applications, and presents the only compelling real-life use case for QR codes.

Short on time? Here are the top takeaways:

  • Most people (and many companies) are bad with passwords: Of the top 10 passwords revealed in the Ashley Madison hack, over 120K accounts used “123456.”
  • There are different levels of security: The most secure is push-notification, followed by token-based, with a fall-back to the simplest—SMS-based authentication. But remember, SMS text messaging is not infallible to being hacked!
  • 2FA makes it easy for your users to protect themselves. But it’s also easy for developers, taking as few as three API calls to implement 2FA on your site or service.