Tuesday, December 18, 2018

Fix Google authenticator recovery

Recover Google Authenticator Accounts

Regular readers know that we strongly recommend implementing two-step verification wherever possible. In the contemporary world, where database leaks are a permanent affair, two-step authentication is not an option, in fact, it is a must. If you use two-factor verification, you will need to get the infiltrator to break into your account, the unique password and gadget that you generate, which generates verification codes.


Backup code

Google offers backup codes as well as some other websites where you can protect your user Google account recovery, with two-step authentication. These are one-use codes that allow you to login into your account if you lose access to your OTP Token. Once this is good, after using the backup code. Most people print these Google Authenticator backup codes and keep them in hand.

It is important to understand that google authenticator recovery is a multi-token, so you can enroll many tokens for different websites using an app. Some of these websites provide backup codes, and if a user is lost smartphone then the user can access these websites.

But what do you do with websites that do not support backup codes?

Google Authenticator is another point against backup codes - they are safe as a password typed on a paper. An intruder can easily copy them if they are physically nearby and use them to gain access to their account. Approved, the intruder has to be in his teammates and the user must know the password, but you know ... things happen.

Saving screenshot of secret key

This is the easiest way to lose access to your account. When you first set up your Google Authenticator, create a screenshot of the barcode with the secret key. Keep screenshots very secure However, if someone around you realizes that they can access your data. Please, mind, if it really happens and someone stole your secret key, they still need to know your user password.

Programmable hardware token

Designed as a more secure alternative to authentication apps, hardware token Protect Imus Slim NFC can be used with Google, Facebook, Hitachi, Dropbox etc. These tokens are easily programmed with an app for Android with NFC support.

The token looks like a credit card and can be taken with you easily. You will always have an alternate source of passwords, for example, if your smartphone battery has been charged or you have reset the phone or accidentally deleted the token.

The hardware token is much safer than a backup code or screenshot of a key on paper - it is absolutely impossible to remove the secret key from a token. Protect Imus Slim allows for NFC unrestricted reprogramming, so whenever you change the token on a service, you can easily program it again and stay protected.

See More Also - How to Recover Google Account

No comments:

Post a Comment