Speaking at the RSA Briefing in San Francisco, cybersecurity experts Aaron Turner and Georgia Weidman discussed 2-gene authentication and biometrics as ways to securing one'due south telephone. Although they concur that the two-factor authentication is the way to go, there are certain caveats.

Authenticator apps like Google Authenticator generally provide better security than SMS-based schemes, withal, they are simply as good as the devices running them.

iOS v. Android — safest phones

Turner besides dispels the myth that iPhones are more secure than Android devices and warns against iPhones that run annihilation simply the latest iOS thirteen. Amongst android smartphones, he praises Pixel devices, and shares that he has "had good experiences with Motorola and Nokia Android I devices"

"iOS is nevertheless good, but Android's SELinux is the bane of my existence as someone who's building exploits," noted Weidman. Turner echos this sentiment:

"We charge three times as much for an Android pentest than nosotros charge for an iOS i,"

Stop buying Samsung phones

Also, Turner had some strong opinions about Samsung:

"Karsten Nohl showed that Samsung was faking device updates last year.  Stop buying their stuff."

To be fair to Samsung, the authors of the study cited by Turner, afterward admitted that some of their findings weren't authentic.

Biometrics — finger/print

Neither expert is a fan of biometrics. Weidman acknowledged that fingerprint readers and facial recognition are "better than zippo when used in addition to passwords."

All the same, Turner was more skeptical "I am fundamentally opposed to using biometrics considering it's non-revocable," citing a case when a gang cut off a human's finger to gain access to his auto that was fingerprint-protected, "fingerprint readers are biometric toys."

According to Turner, the only two-factor authentication method without discovered security vulnerabilities is a hardware security central.

As crypto companies and crypto applications accept become some of the most bonny targets for hackers and regular criminals alike, it is essential that everyone applies best practices to secure their digital assets.