Every time I read comments on posts like these, it reaffirms to me how the average person does not give a shit about real security or is completely ignorant to how and why these extra safeguards are used. Lemmy, I would assume, has a higher than average tech knowledge amongst it's user base vs many other platforms, but the sentiment often that of, MFA and needing to login to a bunch of separate applications is too much work and the people that designed them don't know what they're doing. It's a bit disheartening.
GoDaddy sends a confirmation email for updating DNS. It does not ever arrive faster than 10 minutes from the time they claim they will send it, and sometimes it takes up to 15 minutes. The code expires in 20 minutes, so if you switch focus to something else in the mean time and miss the email and the code times out, you have to send another one and just sit there staring at the email inbox. I have lost hours of my life to GoDaddy MFA. Not all MFA is stupid, but their implementation is amazingly stupid.
Yes, I can't defend dog shit implementation. There are enough authenticator apps available that anyone reputable should use one instead of the less secure email or SMS.
Do I really need TFA for social media? Or a forum? News sites? Fucking weather? Financial logins I get, but every single site requiring it is a cumulative time and hassle burden that is not worth it.
I would say anytime where someone can impersonate you or make purchases as you deserves MFA. That's my risk tolerance, but it can differ obviously. I just feel that threshold is too low for a lot of people.
At work I need multifactor for everything, but... ITS ALL THE SAME MICROSOFT ACCOUNT. We have SSO, but every single stupid webpage needs me to sign in separately with 2FA and forgets about me hours later. It's needlessly tedious.
That should be the bare minimum for everyone, but it doesn't protect anything if a password is compromised, especially something like email that can lead to getting other passwords.
got hired by a new company. every fucking day I have to MFA to use the VPN. then I have to MFA to sign into email. Then MFA into tickets. MFA into confluence. MFA into git.
and then I have to do it all over again 4 hours later after lunch.
The galaxy-brain move is to store the password in a password manager, and also have the same password manager store the TOTP. Finally, you set your password manager to unlock by biometric authentication
All of a sudden, you're set by just showing your fingerprint to the reader.
Well, maybe. You said years plural, so let's take just two years. 2 years * 365 days a year * 24 hours a day * 60 minutes an hour is 1,051,200 minutes in two years.
Let's say that every time you use 2FA it's an extra 2 minutes. How many times a day do you use 2FA? That's probably the biggest variable. For some people it's a couple times a week, for others it's several times a day. Let's say 5 times a day. We also need to know how long you've been using 2FA. That's going to be another big variable. Does 5 years seem reasonable? If so, 5 years * 5 times a day * 365 days a year * 2 minutes each time = 18,250 minutes wasted on 2FA.
That's a small fraction of the million minutes in two years, but it could change a lot depending on some of the variables.
But on the other side, if even one time the 2FA stopped you getting your account hacked, the calculation would change a lot.
i like the idea if username/password with optional passkey as secondary ...
ie "something i can keep in my brain"
mixed with "something a compute device can do"
having only a passkey doesn't feel like it aligns to a "defense in depth" approach, which we've learned many times over is critical to surviving a single oopsy. someone gets access to your passkey manager (eg phone) then you're fucked.
Like with insurance, it's far more worth spending an extra 2.5 seconds on 2fa than it is spending regaining your stolen identity and (potentially) ruined reputation (unless it's text based 2fa)