Aboard a notorious criminal syndicate’s luxurious starliner, Commonwealth operative Simon Kovalic and his crew race to steal a mysterious artifact that could shift the balance of war…

Still reeling from a former teammate’s betrayal, Commonwealth operative Simon Kovalic and his band of misfit spies have no time to catch their breath before being sent on another impossible mission: to pull off the daring heist of a quasi-mythical alien artifact, right out from under the nose of the galaxy’s most ruthless crime lord.

But their cold war rivals, the Illyrican Empire, want the artifact for themselves. And Kovalic’s newest recruit, Specialist Addy Sayers, is a volatile ex-con with a mean hair-trigger who might put the whole mission at risk. Can Kovalic hold it all together, or will the team tear themselves apart before they can finish the job?

Two-Factor Authentication

Two-Factor Authentication

One of the hardest things to do with the Internet is protect your information. The most common way to do this is to employ a username and password scheme. This technique can, and does work, it is not often the most secure. There are techniques to employ a T-N-O, or “Trust No One”, security model. However, for most users this is a bit too cumbersome to setup and maintain. There is a somewhat “happy” medium. It’s called “Two Factor Authentication”.

The basic user and password scheme is only one factor. It is considered one factor because the username, and possibly an email address, are typically viewable to all users of the site that you are using. Two-Factor authentication is where you add an additional “factor”, or method, for authenticating. A password is “something you know” and when you use enable two-factor authentication, the second factor is almost always “something you have”. This second factor can be a key fob, or very commonly, a phone. The device With some services, this can be done either by app or by an SMS message.

The reason one would enable two-factor authentication is to protect their information. When two-factor authentication is enabled and if someone does manage to obtain your username and password, they would need that “something you have” object to be able to complete the login. There are many services that are now offering two-factor authentication for logins. Some of these include Microsoft’s Live.com service (including Hotmail and Xbox logins on the web), Google, Apple, and many many more.

In case you have missed it, there were many celebrities whom had their iCloud backups retrieved by users. While Apple had previously allowed users to enable two-factor authentication it did not extend to their backup service, iCloud.com. Apple’s two-factor authentication now extends to iCloud.com logins as well. Those who stole the pictures were able to retrieve the photos from the celebrities iCloud backups.

Those who stole the pictures were able to access the information by resetting the user’s password and were able to easily guess the user’s “security questions”, because the answers to the questions is information that is easy to locate, given that they are individuals who are more easily recognized and are higher profile. Now, after you have enabled two-factor authentication for iCloud, you will be required to enter in a code sent to you via one of the mechanisms that you registered. When somebody does log in to your iCloud account on a non-recognized browser or device, you will receive an email stating so. If they are able to successfully login, then it is time to change your password, and deregister any devices that you may have an re-register them.

Enabling two-factor authentication will add a bit more complexity when you login, however given the benefits, it is well worth the cost of having a slightly more annoying login process.

Screen Shot 2014-09-16 at 6.46.33 PM