Blog | G5 Cyber Security

Two Factor Authentication: Biometrics vs Alternatives

TL;DR

This guide compares biometric two factor authentication (2FA) with other methods like authenticator apps, SMS codes, and security keys. We’ll cover how they work, their strengths and weaknesses, and help you choose the best option for your needs.

1. Understanding Two Factor Authentication

Two Factor Authentication adds an extra layer of security to your accounts beyond just a password. It requires something you *know* (your password) and something you *have* or *are* – hence, ‘two factors’.

2. Biometric 2FA: How it Works

Biometric authentication uses unique biological traits to verify your identity. Common types include:

These methods typically integrate with platform-specific security features (e.g., Apple Face ID, Android fingerprint unlock) or dedicated biometric authentication apps.

3. Other 2FA Methods

4. Comparing the Options

  1. Security:
    • Biometric: Generally very secure, but vulnerable to spoofing (though increasingly difficult with advanced sensors) and privacy concerns regarding data storage.
    • Authenticator Apps: Highly secure; less susceptible to phishing than SMS codes.
    • SMS Codes: Least secure due to SIM swapping attacks and interception vulnerabilities. Not recommended as a primary 2FA method.
    • Security Keys: Considered the most secure option, resistant to phishing and man-in-the-middle attacks.
  2. Convenience:
    • Biometric: Very convenient if supported by your device; quick and easy to use.
    • Authenticator Apps: Convenient, but requires app installation and setup.
    • SMS Codes: Easy to use initially, but can be slow and unreliable (delivery issues).
    • Security Keys: Less convenient than other methods; requires carrying a physical device.
  3. Cost:
    • Biometric: Usually free, as it relies on built-in device features.
    • Authenticator Apps: Free.
    • SMS Codes: May incur standard text message charges (rare).
    • Security Keys: Cost of the key itself (£20 – £50+).

5. Setting up Authenticator Apps

Most websites and services support TOTP via QR code scanning.

  1. Download and install an authenticator app (e.g., Google Authenticator).
  2. Enable 2FA on the website/service you want to protect.
  3. Scan the provided QR code with your authenticator app.
  4. Enter the generated code from the app into the website/service to verify setup.
    Example of scanning a QR Code using Google Authenticator:
  5. Save the recovery codes provided by the website/service in a safe place!

6. Choosing the Right Method

7. Important Considerations

Exit mobile version