Poor Elmo. The adorable character of Sesame Street, perpetually 3 years, loves us, but someone clearly does not love the hairy red. The computer pirates took over their popular X (previously Twitter) account on Sunday and published a content decided not similar to the delmo. It is surprising for a character and a platform that focus on teaching us a basic rule of social networks: always configure the authentication of two factors.
Since then, all deeply offensive publications have been eliminated from Elmo’s account, which has more than 684,000 followers, and although Sesame Street has publicly commented on the Hack, Elmo’s account has been silent during the last 48 hours.
Thinking, probably all this could have been avoided if the Sesame workshop, which executes the account, had learned a simple lesson.
T is for two factors authentication.
If you have a blue check (or any official color check) in your X account, it is likely to be a goal. Elmo’s account is verified, although we believe it should be a red check. For a while, it was difficult to identify verified accounts because the CEO of X, Elon Musk, eliminated them in 2023, demanding that anyone who would like to pay $ 8 per month. He gave up a year later, and accounts like Elmo recovered his checks. It was good news, except for the fact that computer pirates knew exactly who to point out again.
Adjusted in verification was the authentication of two factors, or rather, how could you verify. The SMS (text -based) verification of X ended for members who do not pay and instead favor codes and safety keys.
But I’m deviating. It helps to explain the authentication of two factors (also known as 2-Factor-Auth and 2FA) in a way that Elmo can understand.
Elmo likes to learn
Elmo Elmo, look at me. Please stop playing with that puppy and look at me.
Yes, yes, I know, “Elmo loves me.” Please listen.
Do you know that account x that you love to use so much, the one you offer hugs and ask us all to come out and play?
I know, of course, it used to be called “Twitter.” No, I don’t know why they changed the name.
Let’s focus.
Your X account has its name, and uses it by starting, right?
Yes, Elmo, you have done a very good job with that. I see you on the account every day, so you clearly know how to log in. That is very good, Elmo.
But, Elmo, his account lacks something.
No, wait, Elmo, do not run away to look for him. It is not something you have dropped.
It must make it more difficult to log in. You need to add something called “two factors’ authentication.”
It is more hard is sometimes a terrifying word, but not this time, and, yes, “authentication” is a great word. I can help.
The security ABC
It’s simple, Elmo, when you log in to your account, you will also need your phone with you to generate a code.
Yes, Elmo, I see your phone. It’s very nice. I know you don’t use it all the time. You are good with that.
The authentication of two factors simply means, Elmo, that when you log in, there is a second step (or factor) that you must achieve before you can use your account again.
First, you must enable the authentication of two factors in your X account. This means that you will need the email you used to create the account. Ask adults in the Sesame workshop to find it. They must also enter the password and then verify the use of a secondary login method.
Now, Elmo, this is where it is complicated a bit. Once this is configured, after logging, Elmo, stop playing with tango for a second and look at me, Twitter will ask for a code.
I use it, and I think you could too, Google’s authenticator
Application once this is configured, after trying to log in (you or a trusted adult, Elmo), a code will be asked. Simply open the Google Authenticator application and take the code shown for X, and then enter X.
After that, Elmo, you ended.
Yes, yes, Elmo is exciting. No, I don’t think it’s fun, but it’s fine if you do.
Give a 2fa hug
Well, I think he understands.
I hope you do it. The technology here is simple: a hacker cannot log in to your account without that secondary verification system. They need that code, which only comes to the application and the phone in their hand.
I promise that computer pirates will try, and can receive emails about their attempts, but they will probably fail because computer pirates do not have that code and cannot complete the login. In addition, 2fa is not just for x; It is a valuable security tool for any online account, which includes email, banking and work accounts.
One more thing for you and, oh, Elmo, returns here for a second. Everyone should change their passwords every six months. This hinders computer pirates who have increased their information in data violation to use old passwords to access their accounts.
I know, Elmo, you love us. We also love you.