Multi-Factor Based Passwords

What is Multi Factor Authentication
The biggest weakness of password based authentication systems is the ability to guess or brute-force passwords. Passwords are relatively easy to guess for many users and commonly reused. The combination allows the hackers to obtain passwords from compromised sites and use them against other sites, thereby taking over the users’ account.

The most common way to mitigate this risk is to enforce multi (2 or more) factor authentication. The 2 commonly used factors are something that you know (password) AND something that you have (phone). The one factor that remains constant is the password that the hacker may be able to guess or brute force. However, the second factor, in most common use cases is a phone. A one time token is pushed/generated on the phone that serves as a second factor. When the user provides both the password and the one time token, they will be able to log in the site. This prevents accounts takeover by hacker through compromised passwords. The hackers will not have access to the phone and therefore will not be able to provide the one time token.

How ReAn provides Multi Factor Strength
All passwords that are generated by ReAn require a combination of Something you know (ReAn Secret) AND Something you have
(Trusted Device). Even if someone is able to guess your Secret, that is useless by itself. Your Secret is a cryptographic input to the Trusted Device. The attackers will not have access to your phone or laptop and therefore cannot even attempt to start guessing the secret. This makes all ReAn generated passwords multi-factored.