Learning Library

← Back to Library

Achieving Passwordless Nirvana with FIDO

Key Points

  • The current landscape is plagued by countless passwords, leading to forgetfulness, weak security practices, and user fatigue.
  • Multi‑Factor Authentication (MFA) improves security by combining “something you know,” “something you have,” and “something you are,” though it may still rely on hidden passwords behind the scenes.
  • The emerging FIDO (Fast IDentity Online) standard eliminates passwords altogether, enabling seamless, password‑free authentication across browsers and services.
  • Combining MFA with FIDO can achieve the “password nirvana” where users authenticate via devices or biometrics without ever exposing or managing a password.
  • The episode includes a bonus “Personal Disaster Recovery” quiz to reinforce understanding of these concepts.

Full Transcript

# Achieving Passwordless Nirvana with FIDO **Source:** [https://www.youtube.com/watch?v=iU7frYhy35E](https://www.youtube.com/watch?v=iU7frYhy35E) **Duration:** 00:11:28 ## Summary - The current landscape is plagued by countless passwords, leading to forgetfulness, weak security practices, and user fatigue. - Multi‑Factor Authentication (MFA) improves security by combining “something you know,” “something you have,” and “something you are,” though it may still rely on hidden passwords behind the scenes. - The emerging FIDO (Fast IDentity Online) standard eliminates passwords altogether, enabling seamless, password‑free authentication across browsers and services. - Combining MFA with FIDO can achieve the “password nirvana” where users authenticate via devices or biometrics without ever exposing or managing a password. - The episode includes a bonus “Personal Disaster Recovery” quiz to reinforce understanding of these concepts. ## Sections - [00:00:00](https://www.youtube.com/watch?v=iU7frYhy35E&t=0s) **Towards Passwordless Authentication Nirvana** - The hosts discuss the chaos of managing numerous passwords, introduce multi‑factor authentication as a bridge, and explore achieving a password‑free “nirvana” while teasing a personal disaster‑recovery quiz. - [00:03:09](https://www.youtube.com/watch?v=iU7frYhy35E&t=189s) **FIDO Standards and Device Loss Recovery** - The conversation outlines how the FIDO authentication standard works across phones, USB keys, and smart cards, then shifts to personal disaster recovery tactics for handling the loss of a FIDO-enabled device such as a mobile phone. - [00:06:18](https://www.youtube.com/watch?v=iU7frYhy35E&t=378s) **Ensuring Reliable Phone Backups** - The speaker warns that backups can become corrupted, stresses the importance of promptly installing software updates for security, and advises regularly testing backups by restoring them, particularly when switching to a new phone. - [00:09:23](https://www.youtube.com/watch?v=iU7frYhy35E&t=563s) **Paranoid Phone Security Strategies** - The speaker shares personal security tips—adding a carrier PIN to block account‑takeover attacks, noting a lack of a device lock, and recommending a separate travel phone as a backup for lost high‑value devices. ## Full Transcript
0:00Welcome to Tech Talk! 0:01Today's topic is passwordless authentication. 0:04I'm joined by Jeff the Security Guy. 0:07A couple of your videos brought us to this topic where you talked about IAM, or Identity Access Management, 0:14and how that applies to rules for passwords -- as well as MFA, Multi-Factor Authentication. 0:23I'd like to get into it a little bit closer about what is-- something you teased us with --the "password nirvana", you called it. 0:32No password required! 0:34No password. 0:35Good. 0:36But before we get there, I want to show that we're having a bonus feature for this one. 0:40It's called "Personal Disaster Recovery". 0:43I've had more than a few of those. 0:45Sorry to hear that. 0:47It's going to be a quiz where you have a seven-- eight choices and we'll see how you do. 0:51All right. 0:52So how can we get to that passwordless nirvana? 0:56Yeah, well, if you think about where we are today, we'll kind of start at the bottom. 1:00And most people have a password. 1:03In fact, they've got lots of passwords that they have to deal with. 1:06And that's a problem because the more of these you have, the more you're likely to forget them, the more you're likely to trivialize them. 1:13It's just a mess. 1:14Who doesn't have like 50 of them? 1:15I know that I do. 1:16Exactly. At least. At least-- that would be a small number. 1:19So what I talked about in this video was using something that would be stronger than passwords, multi-factor authentication. 1:25And with multi-factor authentication-- now, instead of relying just on something I know, I'm relying on something I have, 1:33and something I am, or some combination of those different things. 1:38Now, in those systems, there may in fact still be a password under the covers that's not necessarily exposed to you. 1:45So you might unlock the app with your face, looking at your phone and using the biometric reader. 1:51And the phone itself-- being something you have 1:54--so that's two factors that I'm using, but the system may actually plug a password in. 1:59So the password is not exposed to you directly, but it still exists. 2:03Well, the next turn of the crank, or think of this in an evolutionary step, 2:06would be a standard that is taking hold these days called FIDO. 2:13FIDO? Okay, great, I assume that is not what I'm thinking. 2:16It's not what you're thinking. 2:17This is not your pet. 2:19This is a Fast IDentity Online standard. 2:22And what it does is, it actually removes the need for passwords in the first place. 2:27Now, what you could do is you could use multi-factor authentication in combination with FIDO 2:32and then your browser, the websites can all communicate to each other without passwords at all. 2:38Let me back up just for a second, because when I was coming into work yesterday, I counted how many times I had to log in. 2:44Like there were seven times with Box and email, etc., etc. 2:49I had to provide a log in and my password. 2:53I understand with MFA that's going to cause a bunch of challenges. 2:56How does that eliminate those challenges? 2:58So what it's doing is, FIDO has --we won't go into the details in this video 3:03--but there are protocol that exchanges different proofs as to who you are. 3:09So the website that's enabled for FIDO, and not all are, but we're seeing them start to more and more become the case. 3:17They can communicate with your browser and they exchange secrets and tokens and things like that 3:22that happened behind the scenes without prompting you. 3:25But I'm not quite sure I'm following here. 3:27Is this a standard or a device? 3:30It is a standard. 3:31And many devices then can be FIDO-compliant. 3:34So you could use different types of devices like your phone, or like a particular flash drive 3:39that you stick into your laptop-- a different type of something you have. 3:44Or like a smart card that we use for getting into the building? 3:47Absolutely. 3:48So there's a lot of different types of devices that FIDO would be able to support in that. 3:52Well, that's great, 3:53but now it brings me to the PDR or the "Personal Disaster Recovery" [quiz]. 3:57And I've had to deal with some disasters because I'm the I/T support back at our house. 4:02And so what I wanted to do is provide you with a list of potential things to avoid the problem where -- what if I lose that device? 4:10To demonstrate that point, you have a cell phone, right? 4:12Sure, sure. 4:13So here's your phone. 4:14You travel a lot. [Jeff] A lot. 4:17So imagine that Jeff is traveling and he loses his phone, either at the airport, or worse, 4:22loses it somewhere he's not going to be returning back to. 4:26What is it you do on that travel? 4:29How do you recover from that? 4:31Well, the first thing I do, after I stop crying, is I start trying to figure out how I can recover the device. 4:37So maybe find another device, buy another device, if I know what's truly been lost. 4:42And then I start trying to recover the data. 4:46The device itself can be fairly easily replaceable at some cost, but the data is the really critical part. 4:52And for using that as part of our authentication scheme, then that becomes a linchpin that everything else is relying on. 5:00And that brings me then to my main point-- and I want you to take the PDR Quiz. 5:04There are eight questions and you get checkmarks. 5:07If you get four or more, that's considered a pass. 5:11If you get less than four, then you maybe have some security problems. 5:14And if you get eight, you get the "Golden Beanie". 5:17So here we go. 5:19So the first one is, is-- and this one, I think you alluded to --is make a backup. 5:25And I know that sounds simple. 5:26And a lot of people, they back up, if they do, to a cloud. 5:31Is that what you do, I think? 5:32Yeah, absolutely. 5:34I would definitely backup to a cloud, because that way you don't have to be in any specific location. 5:39You can be anywhere and pull the data back down and restore from the cloud. 5:42But I would argue that you also need to backup to some sort of hard drive, device, or laptop -- something like that. 5:49And the reason is, is that if you want to get to the cloud, imagine if you're pulling down multi gigabytes of your favorite photos. 5:55That is literally going to take hours. 5:58Plus, there's another thing is, is that if you have a local backup, you can have revisions. 6:02Absolutely. 6:03In the cloud, you don't have them. 6:05Yeah. And we in the security space refer to ourselves as "belt and suspenders". 6:09So we don't ever rely on any one thing to keep it all together. 6:13So if the cloud failed, or if the local backup failed, I have backups for my backups. 6:19In fact, I've known people who have had a hard drive fail, 6:23and then they found out that their backup, which they've been doing religiously for years, in fact, was corrupted. 6:27So it does really happen. 6:29The next one on the list. 6:30Oh, and you get a checkmark. 6:31Yeah, yeah, I definitely do that. 6:33Awesome. Great. 6:34The next is, is that do you update your software? 6:37Absolutely. 6:38This one's really critical because what happens in most of those software updates that you see 6:43that may be waiting on your phone and you haven't applied yet, there's probably security fixes in there as well. 6:49And that means the bad guys know how to exploit your phone and you haven't put in the things to block it, if you haven't applied those. 6:56It's practically a race condition then. 6:57It really is. 6:58And it's a question of do you apply first the patch, or do the bad guys get to your phone and exploit it first? 7:04Fair enough. 7:05So you get a checkmark. 7:06I absolutely do this. 7:07Now, this one, maybe not so. 7:09We'll see. 7:10And that is, do you actually test your backup? 7:14Sort of. Could be better. Could be better. 7:17But I do test it from time-to-time. 7:19And the best-- the one test that I know, I end up running on a fairly regular basis, whenever I get a new phone. 7:25If I upgrade at least every two years, then I restore from that cloud backup, for sure. 7:31And that's actually the test that I say that you should give a try is, if you upgrade your phone 7:35or if you have someone else who's upgrading their phone, try restoring from your backup onto their phone to make sure it actually works. 7:42Yeah. 7:44And the next one on the list is recovery. 7:47Now, this is the thing, especially for like emails. 7:50You have an email which is using two factor authentication and you have to authenticate to that. 7:56You've lost your device. 7:57Well, if you have a recovery email, or recovery phone number, you have a way of recovering from that situation. 8:04So there is a really good... 8:07It's really important to have multiple sources that have designated, 8:10either multiple phone numbers for you, maybe pick another family member, or close friend that you can trust. 8:16Another email address. Have some backup email addresses yourself. 8:20But yeah, definitely you don't want to have your recovery just be one option. 8:24I think you called that an "out-of-band" sort of situation, 8:27where you have something that is not dependent on that particular device that you can rely on. 8:31And so really closely related to that is backup codes. 8:36And this one might not be quite so obvious. 8:39A backup code for your email says I'm going to generate a bunch of random sort of passwords, which are one-time use only. 8:47And they bypass all the MFA checks. 8:52Those are really helpful if you don't have the device. That means you can create a printout of it, 8:57you can put it in a safe location next to your will or something like that. 9:00And that way you have a way of getting back online without having to rely on an out-of-band person. 9:08Yeah, yeah. 9:08I definitely store those. 9:10I'm seeing a pattern here. 9:12Yeah. Security guy. 9:13We're professional paranoids. 9:14What can I say? 9:15Well, here's one that I think I'm going to catch you on. 9:19Do you have a sticker on your phone "If lost, find..."? 9:23I do not. 9:24I do not. 9:25It would mess up the esthetic of my phone 9:27and I don't know if I could deal with that. 9:29Well, I mean, actually, I have a true confession: I don't have one either. 9:32I really should. 9:33But yeah. 9:35It would be a good idea, though. 9:36So it is a good idea. 9:37And another good idea is on your account-- when you have your account with your cell phone provider, 9:45you can add an additional layer of security beyond just the password-- a PIN number. 9:50So like when you call to change your service, they ask you for that. 9:55What do they call it? 9:56They have a specific name for it. 10:00I think you've mentioned that once before, it was when someone is trying to force their way into account. 10:04Yeah. Yeah. 10:04So account takeover. 10:06ATO is the acronym we use in the security space. 10:09So we want to prevent that if someone is trying to get into your account that they be able to do that. 10:13So this is ATO defense. 10:16Did you get that one? 10:17I absolutely do that one. 10:19Okay. 10:19Well, maybe the last one I can get you on, which is a hard one. 10:23This is the-- we'll call it the "extra credit paranoid one" is that-- and I can tell you from personal experience, this has happened. 10:31Your family member goes on a trip. 10:33Say, for example, whitewater rafting and they lose their phone, right? 10:39And it happens to be a $1200 new phone. 10:43Can you imagine how awful that would be? 10:45Speaking hypothetically. 10:46Yes, of course, speaking hypothetically. 10:48And what I propose is that you have a travel phone. 10:51When you upgrade-- have you upgraded your phone recently? 10:53I'm about to. 10:54Awesome. 10:55So what you do is take your old phone and use it when you travel, 10:59especially if it's to a remote location, or an area where you might potentially have a high risk of-- difficulty of recovering. 11:07And that's an example travel-- Do you have that? 11:09I do not. No, I'm going to fail on that one. 11:11Okay. 11:11So Jeff's score was six. 11:14Six out of eight. 11:15Okay, that's really good. 11:17So there you go. 11:18I'm going to wrap it at that. 11:19And if you'd like to hear more Tech Talks, please drop us a comment below. 11:24And before you leave, please remember to click Like and Subscribe.