This podcast explores the consequences of a network breach caused by Google Authenticator. It discusses the vulnerabilities of the app and suggests an alternative. The hosts also delve into TV setups and streaming services, comparing different approaches for a convenient viewing experience. Additionally, they recommend Collide for device compliance and advise against unreliable external hard drive brands.
Choosing security solutions based on your threat model is crucial to avoid breaches like the one caused by Google Authenticator.
Evaluate the value of what you are securing and select appropriate security measures, such as paid services or work-specific authenticators.
Deep dives
Google Authenticator and Network Breaches
One company's network breach became worse due to Google Authenticator. The compromise of a customer support system led to attacks on 27 cryptocurrency industry customers. The attacks were initiated when a retool employee clicked on a phishing link in a text message claiming to be from the company's IT team. The compromised employee provided both a password and a temporary one-time password from Google Authenticator. Google Authenticator is not securely synced via the cloud, making it vulnerable if a Google account is compromised.
Choosing Security Solutions and Threat Models
The podcast episode highlights the importance of choosing security solutions based on your own threat model. It references a case involving a wired reporter who refused to sell a valuable Twitter handle but fell victim to social engineering attacks through Apple iCloud. The episode also emphasizes the need for individuals and companies to assess the value of what they are securing and choose appropriate security measures. It suggests considering paid services or authenticators tied specifically to work accounts to enhance security.
Creating a Personal Media Center
The hosts discuss their approaches to creating personal media centers for watching streaming services and organizing media. One host recommends using a computer with a regular operating system and Firefox browser, along with a remote control for easy navigation. Another host suggests using Kodi, a popular media center software, paired with an external enclosure and NAS hard drive for storage. The hosts also touch upon the advantages of using Roku devices for streaming services and consider the pros and cons of various setup options.
We were asked about picking the right external storage solution.
Kolide
Kolide ensures that if a device isn’t secure, it can’t access your apps. It’s Device Trust for Okta. Watch the demo today to see how it works at kolide.com/25a