Two-factor abomination

Generated by the Jetpack AI based on the content of the entire blog entry. In the public domain.

We all know that the internet is a dangerous place, with lots of bad actors trying to scam us, spam us, doxx us, phish us, and troll us. And then there’s Facebook. In many ways, however, the real cyberthreat comes instead from all the IT people ostensibly trying to keep us safe.

By fogBlogger. In the public domain.

And then it goes downhill from there …

Another invention that someone probably should also be apologizing for in 20 years is two-factor authentication (2FA), where login attempts need to be confirmed through the use of a secondary, time-limited code that is sent to you via e-mail, SMS, or some authenticator program.

It’s not that 2FA is a bad idea as such but the implementations of it often seem designed more to frustrate legitimate users than any would-be hackers. Often, the codes simply don’t work. Or they get sent to you by e-mail when you have no access to it at that time. Most often, however, the frustration derives from having to wait an inordinately long time to get the code, making you unsure if the code was even sent in the first place. (So you ask for another. And another. And then they all arrive simultaneously.) Or the code gets sent by default precisely to that app you’re trying to log into and for which you need the code. But, for a prime example of a really moronic implementation of 2FA, we need only turn—rather unsurprisingly—to the University of Not-Bielefeld.

But, in the wake of a cyberattack that almost took over the University’s servers in 2023, IT decided that it was time to install 2FA to log in to the University’s most critical of online services (e.g., webmail, VPN, or the teaching platform but not those for downloading copyrighted, licensed software or any of the millions of admin forms). The first step in implementing this late last year was to divide the single login pages into two separate ones, one for the username and a second one for the password. I still have absolutely no idea how this increases security. Is the guiding principle here that hackers (or their computer algorithms) are somehow inherently lazy or give up easily?

Generated by the Jetpack AI using the prompt "A high resolution, close-up image of a laptop with so many dongles hanging from it that it is impossible to use the laptop." In the public domain.

And for our electronic teaching platform (StudIP, an anagram of stupid, BTW; just saying …), you can add a seventh step on top of that because the login page now defaults to one where you can select your status group for the login procedure: admins, people outside the University of Not-Bielefeld, or the 15 000+ members of the University for which the platform is actually designed (you know, those who actually do or, even more incredulously, receive the teaching?), who now have to click an extra box to even begin their official, patience-straining, but fabulously secure login journey.

Generated using the Jetpack AI using the prompt "A bunch of IT nerds trying to play baseball but failing miserably at it." In the public doman.

And the fun continues …

After that same hacker onslaught, all staff were required to install a sentinel program that apart from being a normal antivirus program also automatically monitors our computers for threats or other suspicious activities that are then blocked both on the computer and also centrally if need be. The former actually happened to me recently because of a threat that was menacingly identified as “persistence_deception” and which was severe enough that the sentinel program blocked my computer from accessing the internet anymore. But not to fear because the same program also provided me with the e-mail address and URL of our IT service desk for help, both of which are incredibly handy when you have no internet.

And then it all started from zero a few weeks later with the next Nextcloud update. In the end, my permanent solution was to simply stop using this University-approved program, which I always found to be a general pain in the ass anyway, and to go back to using Google Drive. I mean really. Let’s think about which is more likely to occur: a data breach at google or a(nother almost) successful hacking of the University’s servers, probably because someone wasn’t staying alert to that stupid e-mail banner and got reeled in by a phishing attempt in a split-second brain fart.

Again …

Leave a comment