{"id":5709,"date":"2019-10-22T19:01:33","date_gmt":"2019-10-22T16:01:33","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=5709"},"modified":"2024-05-15T21:35:28","modified_gmt":"2024-05-15T18:35:28","slug":"2fa-chatbots-vs-sms-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/","title":{"rendered":"2FA Chatbots vs. SMS Authentication"},"content":{"rendered":"\n<p>In this article, we&#8217;ll explain what is a bot for two-factor authentication and how 2FA chatbots (two-factor authentication with messaging service chatbots) work. We&#8217;ll look at the pros and cons of this one-time password delivery method and figure out which is best: 2FA bots or SMS authentication.<\/p>\n\n\n\n<p><a name=\"How did the Protectimus Bot token come to be\"><\/a><\/p>\n\n\n\n<p><strong>Table of contents:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#How did the Protectimus Bot token come to be\">How did the Protectimus Bot token come to be?<\/a><\/li>\n\n\n\n<li><a href=\"#How does two-factor authentication with chatbots work?\">How does two-factor authentication with chatbots work?<\/a><\/li>\n\n\n\n<li><a href=\"#2FA Chatbots: the pros and cons\">2FA Chatbots: the pros and cons<\/a><\/li>\n\n\n\n<li><a href=\"#SMS authentication: pros and cons\">SMS authentication: pros and cons<\/a><\/li>\n\n\n\n<li><a href=\"#In summary: 3 reasons to stop using SMS authentication and start using 2FA chatbots\">In summary: 3 reasons to stop using SMS authentication and start using 2FA chatbots<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How did the Protectimus Bot token come to be?<\/strong><\/h2>\n\n\n\n<p>One of our clients (a payment system with 2,000,000 active users) was spending about $30,000 per month on SMS delivery. They were using SMS to send out one-time passwords and system notifications (withdrawals and deposit notifications, informational messages, etc.).&nbsp;<\/p>\n\n\n\n<p>This client gave us the task of developing a one-time password delivery method that would be just as convenient for end-users as SMS authentication, but more secure and less expensive.&nbsp;<\/p>\n\n\n\n<p>The solution we came up with while looking for SMS two-factor authentication alternatives is using <a href=\"https:\/\/www.protectimus.com\/protectimus-bot\">2FA chatbots on messaging services<\/a>. Additionally, the Protectimus 2FA chatbots can be used to deliver both one-time passwords and notifications of any kind. Now, our client is saving about $20,000 per month that they used to spend on SMS messages.<\/p>\n\n\n\n<p>2FA chatbots in instant messaging apps solve the majority of problems associated with SMS authentication: first, it&#8217;s more secure; second, it&#8217;s FREE! What&#8217;s more, chatbots are virtually just as easy to use as SMS.<\/p>\n\n\n\n<p><a name=\"How does two-factor authentication with chatbots work?\"><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<center><div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.protectimus.com\/protectimus-bot\" style=\"background-color:#269400\">Learn more about Protectimus Bot<\/a><\/div><\/center>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does two-factor authentication with chatbots work?<\/strong><\/h2>\n\n\n\n<p>Currently, the ProtectimusBot chatbot is available on three messaging services:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.messenger.com\/t\/ProtectimusBot\" target=\"_blank\">Facebook Messenger<\/a><\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/web.telegram.org\/#\/im?p=@ProtectimusBot\" target=\"_blank\">Telegram<\/a><\/li>\n\n\n\n<li>Viber<\/li>\n<\/ul>\n\n\n\n<p>Practically every smartphone user already has at least one of these free messaging apps installed.<\/p>\n\n\n\n<p>When a user enables two-factor authentication via Messenger, Telegram or Viber they:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Choose one of the messaging services listed and find the ProtectimusBot on it.<\/li>\n\n\n\n<li>Request their unique ID using the \/getid command.<\/li>\n\n\n\n<li>Input the ID they receive into the system they wish to protect.<\/li>\n\n\n\n<li>Then, the Protectimus two-factor authentication service will create a token and send it to the user via the 2FA chatbot.<\/li>\n\n\n\n<li>The user confirms that they received the one-time password by inputting it into the appropriate field. This also completes the token issuing process.<\/li>\n<\/ol>\n\n\n\n<p>After that, all one-time passwords and messages from the service will be sent through the 2FA chatbot. Two-factor authentication using chatbots in messaging apps for Android and iOS is free for both our clients and their end-users.<\/p>\n\n\n\n<p>You&#8217;ll find an example of how the Protectimus Bot token is issued in the video below.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/youtu.be\/gvFl2AQqz94\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Let&#8217;s look into the technical side. The chatbot-based software OTP token supports all two-factor authentication algorithms: HOTP, TOTP, and OCRA. Because of this, the ProtectimusBot 2FA chatbots also support <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">CWYS (Confirm What You See) data signing functionality<\/a>. Data signing involves generating a one-time password based on data from the operation the user is performing; for example, transaction data can be used: the amount, currency, recipient, time, etc. This feature is indispensable for payment systems and banks. It&#8217;s impossible to use the one-time password, generated on the basis of such unique data, to sign an illicit transaction, even if an attacker intercepts the OTP. Currently, only four <a href=\"https:\/\/www.protectimus.com\/tokens\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus tokens<\/a> support CWYS functionality: the 2FA app Protectimus Smart, as well as Protectimus Mail, Protectimus SMS, and the 2FA chatbots.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<p><a name=\"2FA Chatbots: the pros and cons\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2FA chatbots vs. SMS authentication<\/strong>&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2FA chatbots: the pros and cons<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Chatbots for two-factor authentication are available at no cost to both clients and their end-users.<\/li>\n\n\n\n<li>The Protectimus Bot 2FA chatbot allows you to deliver both one-time passwords as well as other messages and notifications.<\/li>\n\n\n\n<li>Messages on these messaging services are transmitted in an encrypted form, Telegram is almost the <a href=\"https:\/\/www.protectimus.com\/blog\/trustworthy-messaging-apps\/\">best messaging app<\/a> when it comes to security. If someone intercepts a one-time password, they won&#8217;t be able to decrypt it.<\/li>\n\n\n\n<li>Passwords are used to protect access to the messaging services over which OTPs are delivered. Additionally, access to messaging services can also be protected using two-factor authentication.&nbsp;<\/li>\n\n\n\n<li>If someone attempts to log in to your account, you will immediately receive a notification.&nbsp;<\/li>\n\n\n\n<li>Messages aren&#8217;t delivered over cellular networks. That means that GSM network vulnerabilities can&#8217;t be used to intercept one-time passwords.<\/li>\n\n\n\n<li>We also have yet to hear of any virus that can extract one-time passwords from messaging apps. On the other hand, <a href=\"https:\/\/www.protectimus.com\/blog\/mobile-virus-android-bankosy-intercepts-otp-passwords\/\">viruses that extract OTPs<\/a> from SMS messages are plentiful.<\/li>\n\n\n\n<li>The Protectimus Bot token can also be used outside of areas with cellular network coverage as long as internet access is available.<\/li>\n\n\n\n<li>Users don&#8217;t need to install another app or buy two-factor authentication hardware tokens. One of these messaging apps is already installed on 99% of users&#8217; phones.<\/li>\n\n\n\n<li>Chatbots for two-factor authentication can even be used when you don&#8217;t have access to your phone \u2014 there are web-based versions of Telegram, Viber, and Facebook Messenger.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Internet access is needed to use messaging apps. However, you&#8217;re more likely to have problems with cellular network coverage than with internet access. 3G\/4G\/5G technology is available wherever there is cellular network coverage. If there&#8217;s no coverage, you can find a Wi-Fi hotspot or use a wired internet connection.<\/li>\n\n\n\n<li>It&#8217;s possible to log in to messaging services from several devices and forget to log out, leaving multiple sessions active at once. For example, while writing this article, I have three active Telegram sessions: one on my smartphone, one on my work computer, and one on my laptop at home.<\/li>\n\n\n\n<li>To issue a token, users need to add the ProtectimusBot chatbot themselves.<\/li>\n<\/ol>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td height=\"50\" width=\"50%\"><strong><span style=\"color: #6dbf50;\">2FA chatbots Pros<\/span><\/strong><\/td><td height=\"50\" width=\"50%\"><strong><span style=\"color: #60c5e9;\">2FA chatbots Cons<\/span><\/strong><\/td><\/tr><tr><td height=\"40\">The 2FA token is available free of charge.<\/td><td height=\"40\">Internet access is required.<\/td><\/tr><tr><td height=\"40\">Messages are transmitted in an encrypted form.<\/td><td height=\"40\">Users must activate the ProtectimusBot chatbot themselves.<\/td><\/tr><tr><td height=\"40\">Access to messaging services is password-protected, and 2FA can also be enabled.<\/td><td height=\"40\">Users must be mindful of the risk of granting several devices access to a messaging service.<\/td><\/tr><tr><td height=\"40\">Users receive notifications when someone logs into their accounts from new devices.<\/td><td height=\"40\"><br><\/td><\/tr><tr><td height=\"40\">Cellular network problems do not affect the operation or security of the 2FA chatbots.<\/td><td height=\"40\"><br><\/td><\/tr><tr><td height=\"40\">Viruses capable of extracting messages from messaging apps are not yet known to exist.<\/td><td height=\"40\"><br><\/td><\/tr><tr><td height=\"40\">Users do not need to install new apps or order hardware tokens.<\/td><td height=\"40\"><br><\/td><\/tr><tr><td height=\"40\">2FA chatbots can be accessed not only from smartphones, but also from computers and tablets.<\/td><td height=\"40\"><br><\/td><\/tr><tr><td height=\"40\">CWYS (Confirm What You See) data signing functionality is supported.<\/td><td height=\"40\"><br><\/td><\/tr><tr><td height=\"40\">Both one-time passwords and other kinds of messages can be delivered.<\/td><td height=\"40\"><br><\/td><\/tr><\/tbody><\/table>\n\n\n\n<p><a name=\"SMS authentication: pros and cons\"><\/a><\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/the-evolution-of-two-step-authentication-means\/\">The Evolution of Two-Step Authentication<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SMS authentication: pros and cons<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In short, there&#8217;s only one essential advantage to using SMS-based two-factor authentication: users don&#8217;t need to visit your office, give out their address to receive a hardware token, or install an app in order to start using one-time passwords. As soon as you have a user&#8217;s phone number, you can start sending them OTPs. Often, this single advantage is enough for clients to choose SMS-based two-factor authentication. Companies will readily sacrifice security for the sake of convenience.<\/li>\n\n\n\n<li>SMS authentication is also well suited to users of feature phones with a traditional keypad, who simply cannot install apps on their phones. This can also be considered an advantage.&nbsp;<\/li>\n\n\n\n<li>Besides, just like Protectimus Bot, Protectimus SMS tokens support CWYS (Confirm What You See) data signing functionality.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<p>The rest is solid negatives, it&#8217;s too expensive and <a href=\"https:\/\/www.protectimus.com\/blog\/reddit-hacked\/\">SMS two-factor authentication hack<\/a> is possible because of too many weak points:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>SMS messages can be intercepted while being delivered over cellular networks.<\/li>\n\n\n\n<li>A one-time password can be intercepted directly on the user&#8217;s device by a virus.<\/li>\n\n\n\n<li>Attackers may request a replacement SIM card in order to gain access to a victim&#8217;s telephone number.<\/li>\n\n\n\n<li>Employees of an SMS service operator are often involved in such schemes.<\/li>\n\n\n\n<li>If a subscriber is located outside the network&#8217;s service area, they won&#8217;t receive an OTP.<\/li>\n\n\n\n<li>Companies spend hundreds of thousands of dollars paying for SMS delivery.<\/li>\n<\/ol>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td height=\"50\" width=\"50%\"><strong><span style=\"color: #6dbf50;\">SMS authentication Pros<\/span><\/strong><\/td><td height=\"50\" width=\"50%\"><strong><span style=\"color: #60c5e9;\">SMS authentication Cons<\/span><\/strong><\/td><\/tr><tr><td height=\"40\">2FA tokens can be issued without any action on the user&#8217;s part.<\/td><td height=\"40\">Massive expenses.<\/td><\/tr><tr><td height=\"40\">No smartphone is needed; a feature phone is sufficient.<\/td><td height=\"40\">Cellular network vulnerabilities.<\/td><\/tr><tr><td height=\"40\">CWYS (Confirm What You See) data signing functionality is supported.<\/td><td height=\"40\">OTPs can be intercepted by smartphone viruses.<\/td><\/tr><tr><td height=\"40\"><br><\/td><td height=\"40\">A SIM card swap attack is possible.<\/td><\/tr><tr><td height=\"40\"><br><\/td><td height=\"40\">Unethical employees of mobile phone service companies may manipulate a SIM card.<\/td><\/tr><tr><td height=\"40\"><br><\/td><td height=\"40\">SMS delivery problems may occur if there is no cellular network connection or roaming coverage.<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p><a name=\"In summary: 3 reasons to stop using SMS authentication and start using 2FA chatbots\"><\/a><\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/sms-authentication\/\">SMS Authentication: All Pros and Cons Explained<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>In summary:<\/strong> <strong>3 reasons to stop using SMS authentication and start using 2FA chatbots<\/strong><\/h2>\n\n\n\n<p>Each approach to two-factor authentication has its strengths and weaknesses. However, after comparing SMS authentication to chatbot-based delivery of one-time passwords, we can clearly see that Protectimus Bot tokens win on every count:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Financial efficiency.<\/strong> Using two-factor authentication via messaging services is more profitable from a financial point of view.<\/li>\n\n\n\n<li><strong>Security.<\/strong> Multi-factor authentication using Telegram, Viber, and Facebook Messenger 2FA chatbots is many times more secure.<\/li>\n\n\n\n<li><strong>Convenience.<\/strong> 2FA using messaging apps is no less convenient than SMS authentication and is even more convenient in some situations (for example, when using roaming).<\/li>\n<\/ol>\n\n\n\n<p>Switch to messaging apps and save money while improving your level of security. If you have any questions, contact us by email at <a href=\"mailto:support@protectimus.com\">support@protectimus.com<\/a>.&nbsp;<\/p>\n\n\n<table>\n<tbody>\n<tr>\n<td height=\"40\">\n<h3><b>Specifications<\/b><\/h3>\n<\/td>\n<td style=\"text-align: center;\" width=\"150\">\n<h3><b>Protectimus Bot<\/b><\/h3>\n<\/td>\n<td style=\"text-align: center;\" width=\"150\">\n<h3><b>Protectimus SMS<\/b><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">\n<h3 style=\"text-align: center;\">1. Financial efficiency<\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Free one-time password delivery<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">No<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Free notification delivery<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">No<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">\n<h3 style=\"text-align: center;\">2. Security<\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Messages are transmitted in an encrypted form<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">No<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Extra protection with a password or even 2FA<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">No<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Risk of OTP interception during delivery over cellular networks<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">No<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Risk of token compromise by swapping SIM cards<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">No<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Risk of OTP being intercepted by a virus<\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"font-weight: 400;\">No data<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Risk of unethical employees of mobile phone service companies manipulating a SIM card<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">No<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">CWYS (Confirm What You See) data signing functionality is supported<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">\n<h3 style=\"text-align: center;\">3. Convenience<\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Internet access required for token to function<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">Yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">No<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Cellular network service required for token to function<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">No<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">Tokens can be issued without any action on the user&#8217;s part<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">No<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><span style=\"font-weight: 400;\">Yes, but the user must supply a phone number<\/span><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><span style=\"font-weight: 400;\">No smartphone is needed; a feature phone is sufficient<\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"font-weight: 400;\">Web-based versions of messaging apps can be used<\/span><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">Yes<\/span><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">10 Most Popular Two-Factor Authentication Apps Compared<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/2fa-security-flaws\/\">2FA Security Flaws You Should Know About<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">4 Reasons Two-Factor Authentication Isn\u2019t a Panacea<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">Top 7 Tips How to Protect Yourself from Phishing Scams<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">Man In The Middle Attack Prevention And Detection<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/byod-security-rules\/\">10 Basic BYOD Security Rules<\/a><\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>In this article, we&#8217;ll explain what is a bot for two-factor authentication and how 2FA chatbots (two-factor authentication with messaging service chatbots) work. We&#8217;ll look at the pros and cons of this one-time password delivery method and figure out which is best: 2FA bots or SMS authentication. Table of contents: How did the Protectimus Bot [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5727,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15],"tags":[16,12,120,10,194,964,130,407,409,139,99],"class_list":["post-5709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","tag-2fa","tag-mfa","tag-multifactor-authentication","tag-otp","tag-protectimus-en","tag-protectimus-bot","tag-sms-authentication","tag-strong-authentication","tag-strong-customer-authentication","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=5709"}],"version-history":[{"count":21,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5709\/revisions"}],"predecessor-version":[{"id":8820,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5709\/revisions\/8820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5727"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=5709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=5709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=5709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}