How to secure your GMAIL account like a pro | YubiKey Tutorial

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 พ.ย. 2024

ความคิดเห็น • 336

  • @richdavis4007
    @richdavis4007 4 ปีที่แล้ว +21

    I lost my TH-cam account and years of work and income through my Google account. Tremendous damage can be done to people. Crooks can't benefit from theft of my videos, but really crushed me. I will learn how to protect my new channel. Thanks for this video! Rich

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +3

      That sucks about losing your TH-cam account - Glad you're finding more security tips like this to prevent that from happening again. Stay safe!

    • @johnbod
      @johnbod 4 ปีที่แล้ว +2

      Hi Rich, I just wanted to say I'm really sorry to hear that happened. I hope you have been able to come back from it.

    • @richdavis4007
      @richdavis4007 4 ปีที่แล้ว +1

      @@johnbod It was a blow, for sure. Years of hard work gone. 2200 videos, gone. Since I love to make videos I kept going and my new channel is doing pretty well. Thanks. Rich

    • @arunaslasiunas6699
      @arunaslasiunas6699 3 ปีที่แล้ว

      @@richdavis4007 hi I am sorry for your Channel But can you Please help Me secure my Gmail account from hackers because my account is important

    • @richdavis4007
      @richdavis4007 3 ปีที่แล้ว +1

      ​@@arunaslasiunas6699 I'm not an expert on this. Best wishes.

  • @shadowtheg0d1
    @shadowtheg0d1 4 ปีที่แล้ว +33

    Thank you for this video. I watched about 10 just like this and what I liked about this one is how easy it was to follow and how clear you were in explaining.

  • @Subzero_901
    @Subzero_901 2 ปีที่แล้ว +2

    He did a very good job imo. Explaining the basics step by step. English is not my first language and I have no experience in using DAWs

  • @flowmusicproduction
    @flowmusicproduction 2 ปีที่แล้ว +1

    Hands down, tNice tutorials is THE best beginner video I've watched. Others want to brag about all the sample, loops, etc they have. You keep

  • @Red1Wollip
    @Red1Wollip 4 ปีที่แล้ว +7

    Wow great explanation to security issues in Google

  • @ns-yz1hj
    @ns-yz1hj 3 ปีที่แล้ว +15

    If someone tells you something can't be hacked, they're either trying to sell you something or they don't really understand hacking. There are lots of "unhackable" things that have been hacked.

    • @abdullahal-shimri3091
      @abdullahal-shimri3091 3 ปีที่แล้ว +6

      We’ll you can’t hack my grandma’s toaster.

    • @kenrock2
      @kenrock2 2 ปีที่แล้ว +1

      Yes.. there is a thing called life hack..

    • @theodore-zk9gk
      @theodore-zk9gk ปีที่แล้ว

      Yes you are right about that one day and I am very sure that it's going to be better for the both of happiness to get as long as this world has to much of lifetime beautiful weather and the way it has been trying to see if that was something safety and an amazing opportunity too cherishing the fact of lifetime beauty and the nature of lifestyle that everyone has too having an amazing female friends who will love too different things for all the right reasons when they are asking for from their good friends and gentleman who is really and who has been trying to make her understanding of this situation in life now

    • @WakeUpAmerican000s
      @WakeUpAmerican000s ปีที่แล้ว

      Newest (2023) FIDO Passkey tech is now supported by Google for Google (Gmail) authentication
      Essentially makes your phone device operate like a Yubikey. More secure and more convenient than SMS based 2FA when set up on devices that are not shared with others.

  • @Edlerer
    @Edlerer 4 ปีที่แล้ว +14

    you deserve a medal. exactly what I was looking for. However, your statement that you will show the ultimate secure method where losing the key means losing the account isn't true because of the backup codes, right?

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +4

      You're right, you want to stay secure but you don't want to risk loosing your data. So use a yubikey as a primary second-factor and the printed codes in a safe as a backup.

    • @arunaslasiunas6699
      @arunaslasiunas6699 3 ปีที่แล้ว

      I Only using Backup codes And google prompt

    • @SolarWebsite
      @SolarWebsite 2 ปีที่แล้ว +1

      ​@@tristanbolton I etched the backup codes in a steel plate with my laser cutter for ultimate disaster survivability.

    • @SorinOltean77
      @SorinOltean77 2 ปีที่แล้ว

      @@arunaslasiunas6699 i don't think google prompt is safer than using regular OTP

  • @hectortg94
    @hectortg94 2 ปีที่แล้ว

    not know , but just know you've affected my life, and apparently tens of thousands of others, in an imnsely positive way. Thank you

  • @milesinaz6168
    @milesinaz6168 3 ปีที่แล้ว +2

    Wow, great video, Tristan. Thanks so much. Clearest explanation for securing a gmail account I have ever heard.

  • @westbccoast
    @westbccoast 6 หลายเดือนก่อน

    Excellent video thank you. The piece that I am a little fuzzy on is the Yubico authenticator piece. You answered all my questions especially about the recovery phone and email.

  • @mdtaylor2274
    @mdtaylor2274 3 ปีที่แล้ว +2

    Thank you Tristan! You've just helped me save a lot of time and this was easy to follow.

  • @ms76nagi
    @ms76nagi 2 ปีที่แล้ว

    Truly liked the way you have explained how to secure one's account. This is very very useful. Thanks !!!!!

  • @101fish9
    @101fish9 3 ปีที่แล้ว +3

    Thank you . You really make sense of these keys .

  • @Angie-rc2so
    @Angie-rc2so 3 ปีที่แล้ว +3

    Tristan, how does yubikey on my google account effect my youtube tv account? Will I need the yubikey to stream TH-cam tv?

  • @rafliidhamul8169
    @rafliidhamul8169 2 ปีที่แล้ว

    You train so well! It's like you comprehend my tempo...

  • @einyv
    @einyv 2 ปีที่แล้ว

    Just locked down all my accounts but all my Gmail did what you suggested, removed phone number recoveries and everything is printed and in the fireproof part of the safe!

  • @phxpaul
    @phxpaul 2 ปีที่แล้ว +1

    if a Ubikey was built like a usb drive, I would use one. But the one I had a few years ago was just a piece of cheap plastic with the metal contacts exposed. It would not set correctly in the usb port and 60% of the time had a loose, intermittent connection, which caused failure errors

  • @gamingkurutta
    @gamingkurutta 2 ปีที่แล้ว +1

    What are the differences from the regural and the free trial one

  • @OGSuperNaqash
    @OGSuperNaqash 9 หลายเดือนก่อน

    Hey this is nice. Thanks for the informative video. I am planning to buy one and was wondering how many accounts can we add on a single key?

  • @Seattle206723
    @Seattle206723 3 ปีที่แล้ว

    Your a Genius man I got trolls trying to fish my crypto! =) Strange emails and all types of BS. Thanks.

  • @thebackstab8730
    @thebackstab8730 3 ปีที่แล้ว +2

    Would you recommend backup on usb or better on paper?

  • @AMJLBCA773
    @AMJLBCA773 2 ปีที่แล้ว

    The second you have backup codes, they key thing is worthless. Great, thanks

  • @v1cVijay
    @v1cVijay 3 ปีที่แล้ว +1

    i am confused. At 12:10 are you setting up the authenticator on the PC or on the phone? Your languages suggests u r setting it up on PC -- but the graphic shows "SCAN the QR CODE" -- so how did you scan the qr code on the laptop? My question is will this authenticator require a phone? Or can it just be installed on a PC?

  • @gadisdinanti8350
    @gadisdinanti8350 2 ปีที่แล้ว

    drums softing good start learning how to make your own lodies. Good luck bro!

  • @c9f-anne579
    @c9f-anne579 4 ปีที่แล้ว +2

    Hi Tristan. Thanks for this video. I don't really understand how (or IF) a hacker could just view files on my desktop computer. I have a wireless network and use it with TiVo, but I HOPE my smart tv does not have access (I don't know how to tell for sure). My iPhone has nothing on it but my contacts - I don't use it for internet at all - just phone calls and text. I do zip/encrypt anything sensitive on my desktop data partition, such as financial info, identity info, password info, etc. (which carries to my backup/image files drives/partitions). Do I really need to do this? I noticed that you had checked to remember "this" computer, or not to require certain security things on "this" computer. If I only use the one desktop for everything online, can I consider that as long as "this" computer (that no one touches but me) is recognized, I don't have to be concerned about the files on my drives? Like if my password manager is unlocked, for instance - is there any way my passwords could be accessed by someone else?. How could someone have access to my files/folders on my desktop?

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +1

      Thanks for the questions.
      There are a number of ways both physically and with virus' that someone could get access to your data, too many ways to list here. First protect yourself from physical access to the data, if your computer is stolen, by using an encryption-at-rest option. Encrypting your zip files is one way, you can secure all your files by encrypting your hard drive. On a mac this can be done under System Preferences -> Security & Privacy -> FileVault on a Windows you'd turn on Bitlocker.
      To protect against cyber attack's, make sure you have a good anti-virus / malware protection, and keep your most important data offline: Digital wallets on a USB drive, Two-Factor codes with YubiKey, and Passwords (better yet use Bitwarden: th-cam.com/video/TcxZyfTOyYw/w-d-xo.html).
      Hope that helps

  • @johnwalshaw
    @johnwalshaw 17 วันที่ผ่านมา

    I like the idea of using the authenticator app with a key. I continue to be cautious about what happens if I lose a key and should I care.
    A bad actor gaining access to email is certainly a major issue.
    Also, maybe Google Voice is the better way to handle 2FA SMS. Or any SMS service that isn't cellular.

  • @uamhenry522
    @uamhenry522 2 ปีที่แล้ว

    just beca a subscriber keep up the good work Sir.

  • @Sc0rphionx
    @Sc0rphionx 4 ปีที่แล้ว +1

    The big question is, Who in the world would want to be posing as Tristan, is like "Hello, tricksters hackers and thief have some respect for themselves"

  • @pernilsson2394
    @pernilsson2394 3 ปีที่แล้ว +1

    How do you that that the maker of these Keys can be trusted?

  • @BrainFester
    @BrainFester 3 ปีที่แล้ว

    Please do a video setting up the Yubikey with FaceBook. I ran into some very unexpected issues, like being asked for a PIN?

  • @Detu
    @Detu 3 ปีที่แล้ว

    Great video! Thanks

  • @harshbarman4887
    @harshbarman4887 2 ปีที่แล้ว

    5 seconds before you said thats a bit boring I was like dude thats sick

  • @emilie1977
    @emilie1977 3 ปีที่แล้ว

    Questions:
    1) backup yubikey? If app/website insert max 1? keys can be broken, stolen, lost
    2) how can you login on mobile if you don't have NFC? Or I have key with USB-A and smartphone USB-C

  • @juniorgiglio
    @juniorgiglio 2 ปีที่แล้ว

    Thx .Nice easy beginners guide. helped plenty!

  • @iRahz.
    @iRahz. 2 ปีที่แล้ว +1

    12:07 what if you already have 2FA already setup? How would you get it onto the key?

  • @ar1n372
    @ar1n372 2 ปีที่แล้ว

    Thank you so much! TNice tutorials video helped produce fire soft thanks bro❤️

  • @mohankumar-ok8mx
    @mohankumar-ok8mx 2 ปีที่แล้ว

    In the GMS switch the “Program” to Analog app 1 TE

  • @AliraRiyazKhan
    @AliraRiyazKhan 2 ปีที่แล้ว

    Absolute W video. I had a lot of money softowing in in a good ti of my life where I would spend it on dumb stuff. But one of the few good

  • @qiuyue4082
    @qiuyue4082 3 ปีที่แล้ว

    Nice video. With your suggested method if I want to connect from my friend’s computer to my gmail account I need to use the ubikey to unlock the authenticator on the phone, right? So the usbA is not an option to buy. Either nfc or lightning for iPhone users

  • @Psychiatry.321
    @Psychiatry.321 ปีที่แล้ว +1

    Security Key is MUST for the following:
    1. Microsoft Account (Windows 11/10 sign in)
    2. Gmail
    3. Facebook
    4. Instagram
    5. Twitter
    6.Tiktok
    7. Reddit
    8. Backup Services
    9. Apple ID

  • @predatorjoutube
    @predatorjoutube ปีที่แล้ว

    I'm not sure but an alternative second step like backup codes does not appear in my case. Maybe because I already added a second key or google remove this option.

  • @veasnahun8554
    @veasnahun8554 2 ปีที่แล้ว

    Been working soft for a few years now... using it on Mac now and it crashes a lot Nice tutorialndering my progress on the tracks im working on ... I'm

  • @Abcd43_er
    @Abcd43_er 3 ปีที่แล้ว

    Hi what camera system are you using?

  • @globalgogetter4469
    @globalgogetter4469 3 ปีที่แล้ว

    Good job Tristan .
    Thanks!

  • @volkinaxe
    @volkinaxe 3 ปีที่แล้ว

    how do i set this up on on firefox

  • @ragon747
    @ragon747 2 ปีที่แล้ว

    @Tristan is there a way to use those keys without have to install any app on the smartphone? just plug in or use NFC?

  • @pilak10
    @pilak10 2 ปีที่แล้ว

    I love your tutorials

  • @angelolualhati9711
    @angelolualhati9711 2 ปีที่แล้ว

    Helped A Lot! Thanks!

  • @itzikperez
    @itzikperez 4 ปีที่แล้ว +6

    Your'e awesome, thanks. really helpful.

  • @KyleTO7
    @KyleTO7 3 ปีที่แล้ว

    Can be yubico authentication app work with most android apps like Facebook and Amazon?
    Or would I have to log in on a browser or my laptop?

  • @alvinanulat1246
    @alvinanulat1246 2 ปีที่แล้ว

    help to get the basics and I'll jus move from there. Thank you!

  • @Mierdorian
    @Mierdorian 2 ปีที่แล้ว

    I just got the soft soft , man tNice tutorials tutorial is perfect

  • @slez222
    @slez222 2 ปีที่แล้ว

    Nice tutorial Micheal, great video to get us started. May you tell - how do I link two or more channels (in the rack channel) as to share the sa

  • @Chris-uh7nm
    @Chris-uh7nm 3 ปีที่แล้ว +1

    There are 10 backup codes, but you only need to use one code each time to access Gmail, correct? So once one of the codes is used, you cross it out, and the rest can still be used? Or, you have to use all 10 of them in a certain order? Thanks!

    • @iRahz.
      @iRahz. 2 ปีที่แล้ว

      Once a code is used, cross it out. Can't be used again.

  • @tamilhacks-9745
    @tamilhacks-9745 3 ปีที่แล้ว

    Thanks man for the info it is really useful👌

  • @bhazer2381
    @bhazer2381 2 ปีที่แล้ว

    clips. I use a drum loop and afterwards I want to record a appguitar. What happens.. the drumloop starts to record again along the

  • @yousefrahib1937
    @yousefrahib1937 2 ปีที่แล้ว

    It can't get anymore simple than this. Thank you soo much howtobasic!

  • @vladimirfillo
    @vladimirfillo 3 ปีที่แล้ว

    Thank you for great explanations.

  • @helmutcaba4029
    @helmutcaba4029 3 ปีที่แล้ว

    Thank you so much for so good information

  • @mervyfaith4876
    @mervyfaith4876 3 ปีที่แล้ว

    very clear and detailed! thanks

  • @DS-wt7ul
    @DS-wt7ul 3 ปีที่แล้ว

    I like your teaching style. Thank you. Do you know if its possible to remove "google prompts" as a verification method after adding a security key to your account? It seems like that would be a weaker link in the chain if it cant be disabled.

    • @DS-wt7ul
      @DS-wt7ul 3 ปีที่แล้ว

      After some research it appears that as of right now, the only way to remove google prompts is to sign out of Google on that device such as a phone. It'd be nice to be able to stay signed in on my phone while also not using it for prompts. However, that also raises the issue that the phone would still remain the weak link since your Google account could be accessed on the phone itself if someone was able to get past your lock screen.

  • @mizumix1051
    @mizumix1051 ปีที่แล้ว

    Great but can i use yubico authentication app on my phone without using the physical cable

  • @mrajax_0101
    @mrajax_0101 4 ปีที่แล้ว +7

    I recommend you to use authy over google authenticator :))

    • @anotheruniquehandle
      @anotheruniquehandle 4 ปีที่แล้ว +3

      I heard there was issues with Authy as well though? Can't remember the specifics though

    • @mrajax_0101
      @mrajax_0101 4 ปีที่แล้ว

      @@anotheruniquehandle no i haven't faced any issue

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +1

      I've just started playing with Authy - new videos coming soon :) - thanks for the recommendation

    • @misterwinner8459
      @misterwinner8459 4 ปีที่แล้ว

      @@tristanbolton i m in india and I see last video uploaded 7 months ago!!!!

  • @donphilipe10
    @donphilipe10 3 ปีที่แล้ว

    Great video, thanks for sharing! Is there a way to disable NFC of the Yubikey?

    • @curtisbme
      @curtisbme 3 ปีที่แล้ว

      No. If you are worried about it, you just have to get one of the ones that don't have it. It would have to be a very targeted attack for someone to have something that can read and replicate nfc, get close enough to the thing to get them, and then know all the other information they need to log in then use the key. If you are someone that have risk of that level of Mr. Robot hacker, you'd probably be using the non-nfc enterprise keys anyway.

  • @JustRandomExplorer
    @JustRandomExplorer ปีที่แล้ว

    Great video indeed, thanks!

  • @BILLALOFFICIAL05
    @BILLALOFFICIAL05 2 ปีที่แล้ว

    Thanks so much for tNice tutorials bro

  • @af6727
    @af6727 4 ปีที่แล้ว +3

    Why don't you recommend keeping a YubiKey 5C Nano plugged in at all times? What risks do that carry?

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว

      It really depends on your computer security from a cyber threat and physical threat.
      I do have a key that I keep plugged in all the time but my most critical accounts I have on other Yubikeys, some in a safe, stored offline to protect those accounts further.
      It is possible you get a virus on your computer or someone steals your computer and they are able to use the codes on the yubikey to access your accounts. Keeping the yubikey unplugged adds some extra security.
      If you want one to stay in the computer, I do like the Yubikey Nano series

  • @knourii
    @knourii 3 ปีที่แล้ว +1

    This video is gold

  • @trannguyenanan5067
    @trannguyenanan5067 2 ปีที่แล้ว

    Your explanation is very clean and clear Thx

  • @islandtimerick2671
    @islandtimerick2671 2 ปีที่แล้ว

    Thank you Tristan. Fantastic presentation on securing Gmail! Would you please address the inherent vulnerability of all authenticator apps. If someone gets a hold of your Authenticator OTP seed they can generate OTP codes for your account, even if the don't have your Yubikey security key. The is OTP seed is plain txt stored by your service provider Gmail.

    • @SorinOltean77
      @SorinOltean77 2 ปีที่แล้ว

      Are you sure the OTP seed is stored in plain text by the provider? That would be a huge security breach potential. I think nowadays all providers of 2FA have to made sure that seeds are stored encrypted.

  • @markhansen6236
    @markhansen6236 4 ปีที่แล้ว +1

    What if my laptop is hacked and I plug in my YubiKey into the hacked laptop? Wouldn't this make the authenticator apps on phones the better choice?
    I asked a similar question about backing up files on Dropbox.

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +3

      There are viruses all over attempting to gain access to authenticator apps on both computers and cell phones.
      By having a yubikey the hacker would have to get the code at the same time you've plugged in the key and login less than 60 seconds from when you've plugged in the key.
      If you're really concerned about the authenticator app getting hacked you could use a air-gapped device, often an old iPhone or Android device without a SIM card and off wifi, and use that to generate your codes.
      Hope that helps!

    • @markhansen6236
      @markhansen6236 4 ปีที่แล้ว

      @@tristanbolton It would just be done automatically by the malware. I think that there's ransomware out there that automatically activates when a USB flash drive is plugged in. The same principle applies.

  • @arunaslasiunas6699
    @arunaslasiunas6699 3 ปีที่แล้ว

    Bro, Please answer If i only use backup codes and Google prompt So My account will still be safe right?

  • @veronicabe7902
    @veronicabe7902 3 ปีที่แล้ว

    You have mentioned about not given either the phone or the associated email to damage the virtue of the account, then, when google asked for the email requested, what's my option to op out? should I be brave enough to delete this email description? then how will I able to recover as asked? or the code in the yubikey will suffide?

  • @DissedInformation
    @DissedInformation 3 ปีที่แล้ว

    My phone doesn't have NFC and uses Micro B. Is there no option to use Yubikey with my phone?

  • @abdullahal-shimri3091
    @abdullahal-shimri3091 3 ปีที่แล้ว

    Great video! Especially using Yubikey authenticator. Would it be safe to leave the key in the computer 24/7? Because constantly removing and inserting it may break something.

    • @SorinOltean77
      @SorinOltean77 2 ปีที่แล้ว +1

      is safe as far as you use the non-NFC key. Like this there is need for a physical button push to actually send the pass/OTP to Google. And so far no malware can simulate that.

  • @Postdisclosureworld
    @Postdisclosureworld 4 ปีที่แล้ว

    Email & phone number recovery would only work w/ location that google has on record; is that right? Not saying this is bullet proof. But it makes it harder than if all that is needed is the text message. Am I wrong about this?

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +1

      I haven't tested this recently, I've encountered the familiar location block before, but I've also gotten past it on other accounts (with the users permissions of course).
      Like you said, I wouldn't count on that being bullet proof, but it is a nice security feature by Google.

  • @thomash5390
    @thomash5390 4 ปีที่แล้ว

    Thanks - Do you have to do this for every Google email address you have?

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +1

      Depends on how important the account is but generally most of them are secured this way

  • @sharonjuniorchess
    @sharonjuniorchess 2 ปีที่แล้ว

    So how do you use backup codes? What is the pathway to entering them. Does it come up as an option only if it has been enabled? Is it an alternative to losing your password or an additional security?

    • @SorinOltean77
      @SorinOltean77 2 ปีที่แล้ว

      Yes, when clicking authenticate you'll have a "No access to security key" option (maybe phrased a bit differently) which will give you the possibility to select another authentication method. If only backup codes are added, you'll get the chance to use one of the previously printed codes.

  • @TabmansTube
    @TabmansTube 3 ปีที่แล้ว

    the Security Key NFC does not support OTP, correct? so for what you showed we need the higher price one?

  • @dxtrr2
    @dxtrr2 2 ปีที่แล้ว

    ive been making complete verses on a single soft, it seems everyone of these tutorials i find like to put a single instrunt on each

  • @hiroooooooo4656
    @hiroooooooo4656 3 ปีที่แล้ว

    I only have a USB yubikey. How can I {a} make a back up {b} use 2fa on my G account on my phone? Thanks for the video by the way very helpful

    • @tristanbolton
      @tristanbolton  3 ปีที่แล้ว +1

      A: you can either have two yubikeys, set them both up at the same time (scan same QR code to both keys) and store the second key in a safe place. Or you can just print the backup codes and store those in a safe place.
      B: when prompted on your phone for a 2fa, just plug the yubikey into your computer, get the code, and enter it on your phone. You will only have to do this during account setup

  • @michalkorsak9726
    @michalkorsak9726 2 ปีที่แล้ว

    YO THANK YOU SO MUCH

  • @DS-wt7ul
    @DS-wt7ul 3 ปีที่แล้ว

    Do you know if the backup codes are vulnerable to brute force attacks? Thank you.

  • @christopherellis2663
    @christopherellis2663 4 ปีที่แล้ว

    SMS is dangerous when: the phone has died, there is no credit in the SIM, you're oversees and have a new SIM card every few months. Uphill battle with banking security follows.

  • @veronicabe7902
    @veronicabe7902 3 ปีที่แล้ว

    oh, you said, that every email has it's own code, and from the yubikey alone, but the passing code using in conjunction with the googe authenticator, will ea time generate a code for the to be copied and paste to be used in ea case, and the solo code, is not displayed. is it right?

  • @ebenezer357
    @ebenezer357 3 ปีที่แล้ว

    I didn’t understand the risks of Google Authenticator. The codes change every 30 secs so it’s impossible to hack them

  • @TabmansTube
    @TabmansTube 3 ปีที่แล้ว

    with both security key and authenticator app (using Yubi Authenticator) setup, you can 2FA with any of those methods at any time, right? The other good thing about using Yubi Authenticator is you don't have to worry about migration when changing phones as the codes/info. are stored on the hardware itself?

    • @snehal6282
      @snehal6282 3 ปีที่แล้ว

      Am I right in thinking if we lose Ubikey we can not have an access to Ubikey authenticator? Did I miss anything,

    • @TabmansTube
      @TabmansTube 3 ปีที่แล้ว

      @@snehal6282 yes you are right so to be safe print your barcode when setting up authenticator very first time as that can be reused as many times you want with different authenticators

  • @alvingray677
    @alvingray677 2 ปีที่แล้ว

    Can I used the yubikey with Authy

  • @AveryTCC
    @AveryTCC 4 ปีที่แล้ว +2

    I'm hoping you regenerated your backup codes

    • @tristanbolton
      @tristanbolton  4 ปีที่แล้ว +3

      Lol - I did regenerate them. I should maybe mention not to post your back door codes publicly 😂

  • @kenrock2
    @kenrock2 2 ปีที่แล้ว

    Can it works on Google tv? Or Maybe create a new account for non important access ?

  • @saikonotpath54
    @saikonotpath54 ปีที่แล้ว

    When I gonna use the yubikey, can i use it on multiple gmail accounts? Or is it for only one account?

    • @edonramadani8017
      @edonramadani8017 ปีที่แล้ว

      have you found the answer? because i want to buy youbikey
      and to secure my 7 gmail accounts .and 2 outlook accoutns.

  • @cuong2411
    @cuong2411 2 ปีที่แล้ว

    But how do I make s in tNice tutorials using my midi keyboard?

  • @inroxgamer01
    @inroxgamer01 2 ปีที่แล้ว

    wow. thank you for the amazing video

  • @elmin2323
    @elmin2323 3 ปีที่แล้ว

    Man thanks so much! Just got myn

  • @minecraftcc
    @minecraftcc 2 ปีที่แล้ว

    The default tempo for the soft is 120 and when i set the tempo to 100 and played it again, the midi plays again in 120 bpm in tempo. Can

  • @udaymane0906
    @udaymane0906 2 ปีที่แล้ว

    anyone. I appreciate it!!

  • @DiscreteCommenter
    @DiscreteCommenter 3 วันที่ผ่านมา

    You left out a security option for avoiding SIM swap attacks on your phone, so that the attacker might even be able to reset your password by having control of your phone number. I'd suggest just porting your number to google voice, secured on a separate google account with a yubikey. Set google voice to make calls on the google voice cellphone app through wi-fi/cellular data, so that none of your calls actually go to your cellphone in the usual way.
    I tend to think that a social engineering attack on google voice (secured by a yubikey) is going to be a lot harder than on a regular phone company.

  • @hussainbiology
    @hussainbiology 3 ปีที่แล้ว +4

    Are u sure the BACKUP codes are secure ??? first using Physical key and then to get access via BACKUP codes ??? plz enlighten me sir

    • @sagichdirdochnicht4653
      @sagichdirdochnicht4653 3 ปีที่แล้ว

      Yeah pretty much. They'll give you only a couple of tries, before they block the requests and you gotta wait for a period of time (pretty long I might add). It is highly unlikely a brute force attack would work (it would have to be extremely lucky) and a Spray Password attack has basically 0 chance, since those codes are random.
      Then you might ask, why the Standard login isn't as secure, asu it also allows only a handfull of tries? Because a) the Homo Sapiens is by far the dumbest species on the planet. Brute Force isn't an option, but Spray Password attacks are. So they'll try often used passwords (such as "Password1") and often have great success with that. If there is no 2FA setup, hackers will get in there in no time. Also if there are keyloggers or anything like that on the PC, they can just get the Passwords that way.
      For the Yubikey and security - even if a hacker got remote controll over your PC and has the Password, still no success, as you need to physically touch that thing in order to work.

  • @eximiousy77
    @eximiousy77 2 ปีที่แล้ว

    Thank you bro !!!

  • @TheFlipgamer
    @TheFlipgamer 2 ปีที่แล้ว

    im having a problem when i put gms and na the patter "app" it doesnt soft like what it was in the video its a loud annoying soft