{"id":6895,"date":"2020-09-03T17:57:33","date_gmt":"2020-09-03T14:57:33","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=6895"},"modified":"2020-09-03T17:58:52","modified_gmt":"2020-09-03T14:58:52","slug":"tesla-app-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/tesla-app-two-factor-authentication\/","title":{"rendered":"Tesla App Two-Factor Authentication Coming Soon According to Elon Musk"},"content":{"rendered":"\n<p>Without a doubt, Tesla&#8217;s electric cars are the best vehicles on the market right now. They attract people with modern design, high efficiency, and the low cost of maintenance and operation. These vehicles are generally considered pretty theft-proof, thanks to always-on GPS which lets owners track their cars. But numerous smart features still make these cars extremely vulnerable to hacking. That\u2019s how the two-factor authentication has become one of the most awaited things among Tesla users.&nbsp;<\/p>\n\n\n\n<p>The good news is that the Tesla CEO Elon Musk has recently <a href=\"https:\/\/twitter.com\/elonmusk\/status\/1294377367075344384\" target=\"_blank\" rel=\"noreferrer noopener\">twitted<\/a> that 2FA is now on the way. He doesn\u2019t provide a timeline, but admits that this is \u201cembarrassingly late\u201d.\u00a0<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/tesla-app-two-factor-authentication-1024x396.png\" alt=\"Elon Musk announces Tesla app two-factor authentication\" class=\"wp-image-6897\" width=\"768\" height=\"297\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/tesla-app-two-factor-authentication-1024x396.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/tesla-app-two-factor-authentication-300x116.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/tesla-app-two-factor-authentication-768x297.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/tesla-app-two-factor-authentication-610x236.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/tesla-app-two-factor-authentication.png 1216w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Why Tesla users are looking forward to 2FA<\/strong><\/h2>\n\n\n\n<p>Firstly, what is <a href=\"https:\/\/www.protectimus.com\/blog\/how-does-2-factor-authentication-work\/\">two-factor authentication<\/a>? It implies a request for data of different types, due to which it provides reliable protection against hacks and virus attacks. Usually, a person must enter a username and password (something they know), and then confirm the entry into the system by specifying the confirmation code sent to their phone (something they have) by e-mail, <a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">SMS, and chat-bot in the messaging app<\/a>, or generated by the <a href=\"https:\/\/www.protectimus.com\/blog\/hardware-or-software-token-which-one-to-choose\/\">2FA app or hardware authentication token<\/a>. In some cases, it is possible to request <a href=\"https:\/\/www.protectimus.com\/blog\/biometric-authentication-pros-and-cons\/\">biometric data<\/a> (scanning of the eye retina, fingerprints voice recognition) &#8211; something they are.<\/p>\n\n\n\n<p>At the moment, you only need a username and password to log in and unlock your car with Tesla apps. Imagine that someone recognized them. Fraudsters can simply install the application on their phone and get access to many of the functions of your electric car.<\/p>\n\n\n\n<p>Two-factor authentication minimizes the risk of this and provides strong protection for your account.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/mfa-myths\/\">6 Multi-Factor Authentication&nbsp; Myths You Still Believe<\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Tesla app two-factor authentication options to choose<\/strong><\/h2>\n\n\n\n<p>If to believe Elon Musk, two MFA methods will be available to the Tesla app two-factor authentication users: SMS and 2FA applications. This means that most probably programmable hardware tokens Protectimus Slim NFC and Protectimus Flex will also fit as they are designed to replace 2FA apps.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SMS authentication<\/strong><\/h3>\n\n\n\n<p>SMS two authentication is one of the most popular solutions. It is convenient and saves time on installing additional applications and buying individual hardware tokens.<\/p>\n\n\n\n<p>It cannot be denied that SMS authentication is safer than simply entering a username and password. But it also has several disadvantages:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The risk of replacing the SIM card;<\/li><li>Cellular network vulnerabilities;<\/li><li>Smartphone viruses.<\/li><\/ol>\n\n\n\n<p>We described all these issues with SMS authentication in detail <a href=\"https:\/\/www.protectimus.com\/blog\/sms-authentication\/\">here<\/a>. Of course, hacking your account won&#8217;t be as easy as it is now when the Tesla app works without two-factor authentication at all, but better choose any other 2-factor authentication method.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"429\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/SMS-authentication-hack.png\" alt=\"SMS authentication vulnarability leads to Reddit hack\" class=\"wp-image-6948\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/SMS-authentication-hack.png 568w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/SMS-authentication-hack-300x227.png 300w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2FA apps<\/strong><\/h3>\n\n\n\n<p>The second popular solution is <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">MFA applications<\/a> that generate one-time passwords on your smartphone. In this case, OTP passwords are not transmitted over any network, which eliminates half of the risks.<\/p>\n\n\n\n<p>This type of two-factor authentication is much more reliable than SMS. But it also has its drawbacks. Every time you connect to the network, you make your smartphone vulnerable. Any downloaded application can go with a virus.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Programmable hardware token<\/strong>&nbsp;<\/h3>\n\n\n\n<p>As a rule, if the application supports two-factor authentication with the help of an in-app authenticator, you can also connect the <a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noreferrer noopener\">Protectimus Slim NFC<\/a> or Protectimus Flex hardware token for the Tesla app two-factor authentication.<\/p>\n\n\n\n<p>Protectimus Slim NFC and Protectimus Flex are programmable TOTP tokens that can be connected almost to any service just like a 2-factor authentication application &#8211; by scanning the QR code that shows the secret key. You install the Protectimus TOTP burner app on your Android smartphone (note that the phone must support the NFC feature), scan the secret key with the help of this app, and then you add this secret key to the token via NFC. You can read more about Protectimus Slim NFC tokens and how to connect them to any website or app you need <a href=\"https:\/\/www.protectimus.com\/blog\/totp-tokens-protectimus-slim-nfc-faq\/\">here<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/programmable-hardware-token.png\" alt=\"Programmable hardware token Protectimus Flex\" class=\"wp-image-6939\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/programmable-hardware-token.png 1000w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/programmable-hardware-token-300x225.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/programmable-hardware-token-768x576.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/09\/programmable-hardware-token-610x458.png 610w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure><\/div>\n\n\n\n<p>The only thing you should be prepared for is that the size of the secret key in the Base32 format should not exceed 32 characters. There is no information yet what secret keys the Tesla app will use, but our programmable hardware token may become the most reliable option.&nbsp;<\/p>\n\n\n\n<p>Hardware OTP token is a separate device that generates one-time passwords autonomously and doesn\u2019t connect to any networks. Hardware tokens are usually produced in the form of plastic cards, USB flash drives, or key fobs. They have just a single purpose: to generate one-time passwords. These tokens exclude the risk of one-time passwords interception or being infected by viruses.&nbsp;<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Conclusions<\/strong><\/h2>\n\n\n\n<p>Obviously, Tesla&#8217;s news has cheered up a large number of electric car owners, as well as those who are just thinking about buying a car. They can now sleep more peacefully.&nbsp;<\/p>\n\n\n\n<p>But there are also users who have taken this Elon Musk security news without great enthusiasm. They want to have the SMS, app, or token authentication just as an option, without the necessity to generate the one-time password always when they need to unlock the vehicle, locate it, flash its lights, and so on.&nbsp;<\/p>\n\n\n\n<p>Please, remember that Teslas are more like computers on wheels than traditional cars, so they have the computers\u2019 advantages and weaknesses. Use the 2-factor authentication wherever it is possible, as it is the best way to ensure your digital security these days.&nbsp;<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Read more<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-transfer-google-authenticator-to-new-iphone\/\">How to Transfer Google Authenticator to New iPhone<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-secure-bitcoin-wallet\/\">How to Secure Bitcoin Wallet<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/9-gmail-security-rules\/\">9 Must-Follow Gmail Security Rules<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/paypal-two-factor-authentication\/\">PayPal Two-Factor Authentication with Hardware Security Key<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/twitter-two-factor-authentication\/\">Twitter Two-Factor Authentication in Details<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/2fa-security-flaws\/\">2FA Security Flaws You Should Know About<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/remote-work\/\">Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic<\/a><\/li><\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Without a doubt, Tesla&#8217;s electric cars are the best vehicles on the market right now. They attract people with modern design, high efficiency, and the low cost of maintenance and operation. These vehicles are generally considered pretty theft-proof, thanks to always-on GPS which lets owners track their cars. But numerous smart features still make these [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[16,779,1222,259,12,120,10,1221,335,130,1220,139,99],"class_list":["post-6895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-2fa","tag-2fa-apps","tag-elon-musk","tag-infosec-news","tag-mfa","tag-multifactor-authentication","tag-otp","tag-protectimus-flex","tag-protectimus-slim-nfc-en","tag-sms-authentication","tag-tesla","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=6895"}],"version-history":[{"count":49,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6895\/revisions"}],"predecessor-version":[{"id":6958,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6895\/revisions\/6958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/6908"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=6895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=6895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=6895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}