Главная
Study mode:
on
1
Introduction
2
Average time to detect an attack
3
What kind of information is at risk
4
No medical data was stolen
5
This is just one attack
6
Have I beenpwned
7
The answer is most likely
8
The problem with these breaches
9
Financial loss
10
Why
11
Usually authentication methods
12
Bad security and bad usability
13
Bad passwords
14
Unprotected passwords
15
Phishing
16
The line of death
17
Wall of death
18
Usability
19
Password managers
20
Limiting failed login attempts
21
Changing passwords often
22
Security questions
23
A clever attacker
24
The industry has rallied behind
25
You know this idea
26
Users will leave
27
User hostile
28
New approaches
29
Email
30
Emailbased authentication
31
Problems with emailbased authentication
32
Problems with SMSbased authentication
33
SMS7 flaw
34
Authentication is deprecated
35
Onetime passwords OTP
36
Google Authenticator
37
Linode
38
Security
39
Hardware keys
40
U2F
41
Applicationspecific keys
42
Security and usability
43
Google study
44
Browser support
45
Issues with hardware keys
46
Biometric authentication
47
Multifactor authentication
48
Why now
49
Apply pressure
50
Require multifactor authentication
51
Specific implementations
52
Django No Password
53
Django Rest
54
Django OTP
55
Django U2F
56
Run server
57
Add physical key
58
Backup codes
59
OTP device
60
One password
61
Onetime password
62
OTP device link
63
Logging out
64
Conclusion
Description:
Explore a comprehensive talk from EuroPython 2017 that delves into replacing traditional password-based authentication with more secure multi-factor methods. Learn about the vulnerabilities of password systems and discover alternative authentication factors such as email-based authentication, one-time passwords (OTP), and hardware keys. Gain insights into implementing these advanced security measures in Python-based web applications, with a focus on Django projects. Understand the pros and cons of each method, including the security benefits of U2F hardware keys and the potential issues with biometric authentication. Walk away with practical knowledge on how to enhance the security of your applications and protect user data from increasingly sophisticated cyber attacks.

Replacing Passwords with Multiple Factors - Email, OTP, and Hardware Keys

EuroPython Conference
Add to list
0:00 / 0:00