Back to Blog

2FA: A Ranking of Annoyances (And Some Terrible Ideas for New Methods)

Two-factor authentication is one of those things everyone agrees we need but nobody actually enjoys using. Let's rank the methods from tolerable to terrible, then propose some alternatives that would technically work but absolutely nobody would use.

Two-factor authentication is the digital equivalent of flossing - yeah, yeah, I know it's good for me, but can we make this any less annoying?

Let's rank the current methods from "tolerable" to "I'd rather just get hacked."

SMS Codes: The Participation Trophy of 2FA

Pros:

  • Works on literally any phone made after 2005
  • No additional apps required
  • Your grandma can figure it out

Cons:

  • Can be intercepted via SIM swapping (ask any crypto bro who lost everything)
  • Requires cell signal, which mysteriously disappears the moment you actually need to log in
  • That 30-second delay between "send code" and actually receiving it feels like geological time
  • The code expires approximately 2 seconds before you finish typing it

Verdict: Better than nothing, but "better than nothing" is a low bar. This is the 2FA equivalent of a screen door on a submarine - technically provides some protection, but not against anyone who's actually trying.

Email Codes: For When You Want to Play Inception With Your Logins

Pros:

  • Universal - everyone has email
  • Can access from any device
  • Permanent record of login attempts

Cons:

  • Wait, I need to check email to access email?
  • Incredibly circular if your email provider uses email-based 2FA
  • Email gets compromised and suddenly your "two-factor" authentication is actually one-factor
  • Spam filters sometimes decide your login code is junk and you discover this 10 minutes into troubleshooting

Verdict: The logical equivalent of keeping your house key under the doormat. Sure, it's convenient, but you've kind of missed the point.

Authenticator Apps: The Goldilocks Option

Pros:

  • Actually secure (generates time-based codes offline)
  • Works without cell signal
  • No SIM swapping vulnerability
  • Industry standard for people who care about security

Cons:

  • Requires installing an app (shocking, I know)
  • Lose your phone and you're locked out of everything unless you saved backup codes
  • Saved backup codes? Where did you save them? Can't remember? Cool, cool.
  • That moment of panic when you get a new phone and realize you didn't transfer your authenticator accounts

Verdict: This is the adult choice. It's also the reason people text me saying "I got a new phone and now I'm locked out of everything, help."

Hardware Keys: For People With Their Lives Together

Pros:

  • Most secure option available
  • Can't be phished
  • Can't be intercepted
  • Makes you feel like a cybersecurity professional

Cons:

  • Costs actual money ($25-50 per key)
  • Need to buy at least two (one for backup) because you WILL lose one
  • Doesn't work with every service (looking at you, random banking apps)
  • That sinking feeling when you're traveling and realize your YubiKey is on your desk at home
  • Explaining to TSA why you have what looks like a fancy USB stick on your keychain

Verdict: Objectively the best option. Subjectively, requires a level of organizational competence I do not possess.

Biometrics: Because Passwords Are So 2010

Pros:

  • Super convenient - just look at your phone or touch the sensor
  • Can't forget your face at home (probably)
  • Works fast
  • Feels futuristic

Cons:

  • Your biometric data is permanent - can't change your fingerprint like you can change a password
  • Doesn't work when your hands are wet, cold, or wearing gloves
  • Face ID fails when you're wearing sunglasses, a mask, or apparently when you get a haircut
  • That awkward moment when you're trying to unlock your phone at a weird angle and it doesn't recognize you
  • Identical twins can apparently unlock each other's phones (niche problem, but still)

Verdict: Great until it isn't. And when it isn't, you're stuck entering your backup passcode with freezing fingers while your phone yells at you that your face is wrong.

Push Notifications: The "Are You Sure?" Method

Pros:

  • One tap and you're in
  • Can see location and device info for the login attempt
  • Easy to deny if it wasn't you

Cons:

  • Requires internet connection on your phone
  • Sometimes the notification doesn't appear for 5 minutes
  • Other times you get 47 push notifications in a row because you tapped "approve" but the system didn't register it
  • Easy to accidentally approve when you're half-asleep and just want the notification to go away

Verdict: Convenient until you're somewhere with bad wifi and your phone refuses to receive the push notification while you watch the login screen time out.


Terrible 2FA Ideas That Would Technically Work

Since we're clearly struggling with the current options, let me propose some alternatives that would be incredibly secure and absolutely nobody would use:

Physical Mail Verification Codes

Every login attempt generates a code that gets mailed to your registered address. Should arrive in 3-5 business days. Better plan your Netflix browsing accordingly.

Pros: Impossible to intercept digitally. The postal service is already slow, so at least your authentication delay would be consistent.

Cons: You'd need to check your physical mailbox before checking your email. Also, good luck logging in while traveling. Also, the entire concept of timely communication dies.

Carrier Pigeon Authentication

Each login attempt dispatches a trained pigeon with your verification code. Response time varies based on weather conditions and hawk activity.

Pros: Environmentally friendly. No digital infrastructure to hack. Pigeons have excellent navigation.

Cons: Requires maintaining a flock of carrier pigeons. Not practical for apartment dwellers. Pigeons occasionally just... don't come back. Your verification code is now circling somewhere over Nebraska.

Notarized Authentication Requests

Every login requires you to visit a notary public who verifies your identity and provides a stamped, notarized authentication certificate valid for single use.

Pros: Extremely difficult to forge. Creates jobs for notaries. Paper trail is literally a paper trail.

Cons: Banks are only open during business hours. This would make checking email at 2am impossible. You'd need to explain to the notary what "logging into Discord" means. Cost per authentication: $15-25.

DNA Sample Verification

Submit a cheek swab for each login attempt. Results available in 24-48 hours.

Pros: Absolutely unambiguous identity verification. Can't share your login credentials even if you wanted to (well, technically you could share biological samples, but let's not).

Cons: Maintaining chain of custody for billions of daily DNA samples seems... challenging. Also, every login attempt requires a medical-grade lab. Also, this is dystopian.

Proof of Physical Fitness Challenge

Each authentication requires you to complete a randomly generated physical task. Run a mile under 10 minutes. Do 20 pushups. Hold a plank for 2 minutes. Video verification required.

Pros: America's obesity crisis solved overnight. Identity theft committed only by people who are also committed to fitness. Your email security correlates with your cardiovascular health.

Cons: Disabled individuals are just... locked out of the internet? Also, good luck logging in from a coffee shop. Also, I'm not doing burpees to check my bank balance. Also, this is insane.

Mandatory Social Vouching

Each login requires three people you know to verify that yes, it's really you trying to log in. They have 15 minutes to respond or the attempt fails.

Pros: Builds community. Encourages maintaining friendships. Impossible to hack if your friends actually pay attention.

Cons: Need to maintain an active friend group of at least 6-8 people to ensure 24/7 coverage. Middle-of-the-night login attempts require waking people up. Your friends learn exactly how often you check social media and judge you accordingly. That one friend who never responds to texts in a timely manner becomes a critical infrastructure failure point.

Astronomical Event Verification

Authentication codes are only valid during specific celestial events. Want to log into your bank? Better wait for the next new moon. Need to access your work email? Hope Mercury isn't in retrograde.

Pros: Unhackable - attackers would need to control the solar system. Encourages learning astronomy. Reconnects humanity with natural cycles.

Cons: Business continuity becomes dependent on lunar phases. Solar eclipses cause login traffic nightmares. Your ability to access Netflix is determined by planetary alignment. Astrology people become insufferable.

Escape Room Challenge Authentication

Each login attempt requires solving a series of puzzles and riddles within 10 minutes. Difficulty scales with account sensitivity.

Pros: Stimulates cognitive function. Makes hacking require actual intelligence. Bots can't solve lateral thinking puzzles (yet).

Cons: That thing where you can't remember the answer and you're just stuck. Also, some of us are bad at puzzles. Also, checking email shouldn't require decoding hieroglyphics. Also, password reset becomes a meta-puzzle about puzzles.


The Actual Answer

Here's the thing: all of the real 2FA methods are annoying because security and convenience exist in tension. The more secure something is, the more friction it creates. The more convenient it is, the more vulnerable it becomes.

The best approach is to match your 2FA method to your actual threat model:

Random social media account? SMS codes are probably fine.

Email or financial accounts? Use an authenticator app.

Anything you'd be devastated to lose? Hardware key.

Anything containing sensitive data about other people? Also hardware key.

And for the love of all that is holy, save your backup codes somewhere you'll actually be able to find them when your phone dies at the worst possible moment.

Because while carrier pigeons would technically work, authenticator apps are probably the better choice.

Need Help Securing Your Digital Life?

Cybercraft Security helps people reduce their digital footprint and implement practical security measures that actually work. No notaries required.

Get Started