2FA or Not 2FA

Password Reuse vs Strong Unique Passwords

  • Many argue the real threat isn’t brute‑forcing long passwords but password reuse plus data breaches and credential stuffing.
  • Strong, unique passwords per site plus a password manager are widely seen as a baseline; reuse is strongly discouraged even with 2FA.
  • Some justify weak passwords for “throwaway” accounts; others counter that compromised accounts can still be abused (spam, impersonation).

Benefits and Limitations of 2FA

  • Supporters: 2FA/MFA is crucial against phishing, credential stuffing, and poorly secured services; hardware tokens (e.g., FIDO2/WebAuthn) are viewed as the only truly phishing‑resistant mainstream option.
  • Critics: mandatory 2FA increases lockout risk, especially when tied to a single phone or SMS; availability is part of security, not just confidentiality.
  • Several note 2FA implementations are often fragile, phishable (SMS, email, TOTP), or security theater.

Availability, Lockout, and Backup

  • Many focus on recovery codes and backup procedures as an underappreciated failure point; users misplace codes or lose phones and are locked out.
  • Storing TOTP secrets or recovery codes in a password manager is common, acknowledged as “1.5FA” but seen as a pragmatic tradeoff.

Passkeys: Promise and Lock‑In

  • Passkeys are praised for solving phishing and password usability, but there is concern about:
    • Tying access to a single vendor ecosystem (Apple/Google/Microsoft).
    • Export/interoperability, attestation “anti‑features”, and de‑facto platform lock‑in.
  • Some use passkeys via third‑party managers as a convenient “skip 2FA screen” mechanism, not as a full password replacement.

SMS, Phone Numbers, and Privacy

  • SMS 2FA is heavily criticized: SIM‑swap risk, roaming/coverage failures, and exclusion of people without reliable phone service.
  • Phone-number‑based identity harms anonymity and can enable denial of access if carriers or providers misbehave.

Password Managers and UX Friction

  • There is debate over which password managers to trust (SaaS vs local, multi‑platform support).
  • Convenience issues (multiple devices, extra clicks, 2FA app fragmentation) drive some users to weaker practices like browser‑stored passwords.

Whose Risk Is Being Managed?

  • Several suggest required 2FA primarily protects service providers from abuse of weak accounts, reducing abuse workload and business risk.
  • Others stress that both user and provider threat models matter, and 2FA is a reasonable response to widespread poor password hygiene.

Side Discussion: HTTPS

  • The article’s lack of HTTPS is criticized; some say static content “doesn’t need it,” others emphasize integrity and privacy for all pages.