This talk explores the modern landscape of 2FA. With a data driven analysis of the tradeoffs between different types of factors, we'll dive into a detailed comparison of cryptographic security strength and UX for methods like SMS, Soft Tokens, Push Authentication, and WebAuthn.
28. 2FA ADOPTION
2019 BYU study found:
https://www.usenix.org/system/files/soups2019-reese.pdf
BELIEVE EXTRA SECURITY
WORTH ADDITIONAL TIME
OR INCONVENIENCE
WILLING TO USE 2FA
DEPENDING ON THE
ACCOUNT
UNWILLING TO USE 2FA
BECAUSE INCONVENIENCE
TOO HIGH
@kelleyrobinson
29% 36% 13%