Git Product home page Git Product logo

howsecuritykeyswork's Introduction

Goal of this document

The goal here is to write a simple, easy to understand document that describes the problem of Phishing, how physical security keys make Phishing harder.

It is targeted towards non-technical audience.

Pull requests are most welcome and encouraged.

Make logging into your Google account more secure using a Security Key

Go do this. Now.

This will make logging into your Google account more secure for you, and harder for anyone else.

Now that you've done that, allow me to tell you how it makes logging into your Google account more secure.

Terms

Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Two-Factor Authentication (2FA)

Two-factor authentication (also known as 2FA) is a method of confirming a user's claimed identity by utilizing a combination of two different components.

Universal 2nd Factor (U2F)

Universal 2nd Factor (also known as U2F) is an open authentication standard that strengthens and simplifies 2FA.

U2F Keys

U2F Keys or Physical Security Keys are USB devices that provide a form of identity verification for 2FA. It looks like this:

U2F Key

Problem to solve: Phishing

Good scenario

Let's say you want to read your Gmail emails, and let's assume that you do not have 2FA enabled for your Google account.

Here's what you would do:

  1. Open https://www.google.com/mail
  2. You are asked to login into your Google account.
  3. You enter your username.
  4. You enter your password.
  5. You can now access your Gmail emails.

Google Login Page

Scenario 1: Google Login Page

Bad scenario

Now consider another scenario. Your cousin Vinny sends you an email that contains a hyperlink to a free lottery to win an iPad. When you click on the link, you are shown a login page similar to previous scenario and here's what happens:

  1. The link goes to www.gogle.com
  2. You are asked to login into your Google account.
  3. You enter your username.
  4. You enter your password.
  5. Something happens. For instance, you may be told that your email address has been entered in a raffle to win the promised iPad.

Gogle Login Page

Scenario 2: Gogle Login Page

Wait, why was that a bad scenario!?

Did you notice the missing o there in the website name in the URL? Let's take a closer look.

Gogle.com?

Did you intend to enter your Google credentials (username and password) on gogle.com?

Here's what may have happened in the background:

  1. You entered your Google credentials on gogle.com.
  2. Now the owner of gogle.com has your Google credentials.
  3. They can now use those credentials to login on Google as you and do bad things such as read your email, send email as you (to your contacts or other people), etc.

This is called phishing. Phishing works because the bad actor only needs your login credentials to login as you.

How can I avoid being phished?

I'm glad you asked that. One of the best ways to avoid this, currently, is to enable 2FA and use a U2F Key as the second factor for authentication.

I repeat: Go do this. Now.

How does a U2F Key defend against phishing?

Put simply, even if someone manages to get the login credentials for your Google account, they still need physical access to the U2F Key that acts as the second factor for authentication.

So for the Bad Scenario above, even if the owner of gogle.com gets your username and password, they won't have access to your U2F key, which would make it impossible for them to log in as you.

How does a U2F Key actually work?

For more details about how U2F keys work, see:

  1. Yubico’s take onU2F Key wrapping
  2. FIDO Specifications Overview

Motivation

Zeynep Tufekci spoke at the Engima 2017 conference about Security in the Wild for Low-Profile Activists.

She mentioned how it was difficult for her to convince activists to use U2F keys because they did not understand how they work and how to use them.

Clarification

Please note that I am not claiming that the owner of gogle.com is trying to phish internet users. That's just an example.

Sources

howsecuritykeyswork's People

Contributors

aawc avatar

Watchers

 avatar  avatar

Forkers

croat79

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.