Securing gmail account - options ?

So i am looking at how to better secure my gmail account, which has become a link to all major accounts ( including financial) these days.

Current setup -
2nd factor through sms.
Used by 2 devices.
Device remembered, so i don't really need to login again. I guess this increases risk of session hijacking from malware. Has never happened to me, yet.
I always use bookmarks/saved url in keepass to go to any account page, so phishing risk seems to be not an issue.

How to improve ?
I am looking at using AWS/ec2 in near future, which also brings some additional risk of its own as they don't have an upper limit and work post paid style.
Chance of all of this is low, but if hacked then impact can be large.

So all of this combined, i am looking at what i can do.

This is what i am considering.
1) Enable yubikey as 2nd factor authentication. Probably this one. Have never used this before, but this might be slightly better that totp. Ill use it at home only.
Use totp as backup, but i will just print out the secret key and backup codes on paper and keep them safe. Wont actually use it.

2) Don't remember session, login every time. Only do this once or twice a day, so only a slight hassle. I use keepassxc.
This doesn't remove session hijacking risk completely, so usual requirement of preventing malware applies. One thing i do is not login to my accounts from windows at all.
So all work stuff does not interfere with gaming stuff.

3) There is something called as device bound session cookie that google is developing to prevent session hijacking, atleast outside the device.
I don't know if this is implemented in chrome nonbeta yet, and don't know how well it works esp on Linux and how to verify that its working.
There are reports of it entering beta last year but no update after that.
This makes sense. I use firefox, but if this works, then just for gmail/aws/financial accounts, i can switch to chrome only.
This one is very interesting, but there is a lack of details.
Until then, we can maybe just look at logged in devices from time to time via https://myaccount.google.com/security

4) There is google advanced protection program, but not sure what it does additionally. I am not switching over to chrome for everything.

5) Last risk seems to be with account recovery options - email/ mobile. But without that, you have the issue of losing access forever. So best you can do is secure those like above.
I don't use my main email with android.

6) For AWS ( never used it before), my plan is to set it all up with root account. Once everything looks ok, then ill just setup a user with least privileges necessary to start/stop ec2 .
Root account login details will probably be saved on paper + 2 factor auth with yubikey. + use monitoring tools.

Any thoughts ?
 
Last edited:
This is what I would do,
  1. Use YubiKey, Google Prompt or SMS to turn on 2FA. (we can't use TOTP at first on Google)
  2. Set TOTP (using an app that has cloud backup). Bonus: find a tool that lets you export your token.
  3. Remove SMS and YubiKey, or at least make it secondary. If you could remove Google Prompt, it's even better (meaning log out from your android device as well)
I don't like YubiKey (single point of failure), SMS (not safe, you could be out of range) and Google Prompts (do I need to say more).
 
I don't like YubiKey (single point of failure), SMS (not safe, you could be out of range) and Google Prompts (do I need to say more).
I haven't tried it yet but can we not have multiple 2fas ?
My plan is to use Yubikey as primary everyday and TOTP as backup in case of hardware failure.
Hardware keys are supposed to be slightly more secure and i read they remove/reduce MITM attacks. Still both are good, agree about sms.

Neither does anything about session hijacking ( any program can easily read cookies of a browser) though which i think is the main risk without a fix - other than to not get a virus in the first place. So for now, logout everytime will reduce the time session is alive to mitigate it a bit. This all seems a bit paranoid, but i have seem multiple people leaking accounts this way even though they had 2fa, read reports that this type of attack is increasing.

Device bound session cookie looks nice in chrome beta, but not much info out there about it since early 2024.
 
I haven't tried it yet but can we not have multiple 2fas ?
My plan is to use Yubikey as primary everyday and TOTP as backup in case of hardware failure.
Hardware keys are supposed to be slightly more secure and i read they remove/reduce MITM attacks. Still both are good, agree about sms.

Neither does anything about session hijacking ( any program can easily read cookies of a browser) though which i think is the main risk without a fix - other than to not get a virus in the first place. So for now, logout everytime will reduce the time session is alive to mitigate it a bit. This all seems a bit paranoid, but i have seem multiple people leaking accounts this way even though they had 2fa, read reports that this type of attack is increasing.
I guess you have put it in better words. It doesn't matter how robust yubikey, TOTP, alana falana is, if the session cookies can be easily stolen.

From my perspective,
  • YubiKey is less secure than TOTP as it can be easily stolen physically.
  • Plus, most websites don't accept it.
  • Single point of failure.
  • One more thing to carry.
I think, a practical 2FA is good enough for everything. Nobody is doing brute-force attacks anymore.
 
  • Like
Reactions: Tracer_Bullet
I think, a practical 2FA is good enough for everything. Nobody is doing brute-force attacks anymore.
This.

Having a reasonable 2FA setup, along with a strong password (or preferably a passphrase) is enough. No need to complicate things.
The weakest link in the chain is you. Don't do anything stupid and you'll be fine.
 
  • YubiKey is less secure than TOTP as it can be easily stolen physically.
  • Plus, most websites don't accept it.
  • Single point of failure.
  • One more thing to carry.
yeah, i don't have a need for accessing gmail when traveling, so it will stay at home. Else it would be one more thing i could lose which i tend to do.
TOTP is vulnerable to man in the middle attacks, but practically if that happens i dont know. Phishing too, but since i always use bookmarks and never via links, it shouldn't be an issue.

Anyway, this one is easy enough. Wanted to see what people do against cookie getting stolen risk.

If I had known that email will become this important, i would probably make multiple accounts and keep important stuff separate and segmented.
What i ended up doing was to send trivial stuff to other email ids so that 1 email id becomes very important.
Maybe i should look at this again and create unique email for atleast the most critical things. Gmail has forwarding, so main account will still see it.
Dunno.

Having a reasonable 2FA setup, along with a strong password (or preferably a passphrase) is enough. No need to complicate things.
The weakest link in the chain is you. Don't do anything stupid and you'll be fine.
yeah that's fine.
But point is that session hijacking steals info post authentication. So 2fa does nothing.
Now yes one can say don't let a virus in, dont click that link - but obviously that's not always going to work.
Things can happen. malware can even creep in advertisements ! I use no script too.
 
Last edited:
But point is that session hijacking steals info post authentication. So 2fa does nothing.
Points 3 and 4 from your original post should be enough to prevent the kinds of attacks you're worried about.
You can enable Device Bound Session Cookies right now via Chrome flags.

You can also tag along a decent enough antivirus (Windows Defender is pretty good if you're on Windows, don't go for aftermarket) for some OS level scrutiny.
 
  • Like
Reactions: Tracer_Bullet
yeah, i don't have a need for accessing gmail when traveling, so it will stay at home.
You may want to reconsider this. Many services/banks do send OTP to your email and if you are not in India, email might be the only way to sign up to stuff. I know incoming SMS is free even abroad but just saying.

If I had known that email will become this important, i would probably make multiple accounts and keep important stuff separate and segmented.
Yeah. That's always a good idea. I have over a dozen Gmails. I'm using separate emails for Aadhaar, banking, social and a few for business.