this post was submitted on 04 Mar 2024
47 points (80.5% liked)

Privacy

31957 readers
534 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

cross-posted from: https://lemmy.ml/post/12744832

As I updated the version to 1.4.0 , adding the 'import' feature I am sharing this here.

I made this extension because I couldn't find one that wouldn't ask for too much permissions (such as accessing all websites data).

Eventually I found it nice to have a TOTP that can really be audited, the code is 649 lines of JS, 214 CSS and 52 HTML. Feel free to fork, copy part of it, contribute or just request fix/features.

I have used it for more than a year every day and it works nicely.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 8 months ago* (last edited 8 months ago) (2 children)

Thank you for your constructive comment.

Indeed many people thinks 2FA as 2 devices. I am not sure where that came from and what specifically make people think that way. Despite all my research and experience using 2 devices solve no specific security problem. I think there is a whole topic to be argued on this (should I make a blog post on this?).

As for me I have Aegis on my smartphone (really perfect nothing to say). But I have many unwanted/unnecessary 2FA to go through every day (for the last 3 years). I am cleaning my cookie/connection every time I close my web browser and I am not keeping my computer on all the time. Therefore those 2FA needs to be done a lot (I mean at least 3 time a day). I do not interact much with my smartphone, also this is the least secure device I own so web browser extension is an OK way. I used to have a python script I could have run from one of my IoT through ssh. So far I don't see any vector of attack this would prevent compared to browser extension.

I see hundreds of thousands of users using other extensions that I wouldn't run on my system and I am sharing a better solution, nothing perfect, nothing that requires mass adoption.

[–] [email protected] 2 points 8 months ago (1 children)

Thanks a lot! I selectively keep cookies for login sites, which is not a good solution.

The threat is websites escaping the browser sandbox and reading stuff. I dont know if this is really that realistic though.

[–] [email protected] 2 points 8 months ago

Websites have no way to creep into your browser, extensions included. Usually it is the other way around. Such a leak would be catastrophic for the browser (thinks of all the password manager). At least here it is not even a password manager but only the TOTP so you still have your password as security (still this will never happen realistically).

[–] [email protected] 6 points 8 months ago (1 children)

2FA being on a separate device is simply the most secure way of doing it. An attacker who gets access to some passwords for my accounts can't do a whole lot without also physically stealing my phone.

It's simply an extra hurdle for malicious actors to go through.

Though I guess in most cases, having any 2FA at all will probably already turn off a majority of attackers.

[–] [email protected] 2 points 8 months ago (1 children)

can't do a whole lot without also physically stealing my phone.

??? Theres a while bunch of loopholes they can exploit without having access to your phone, here's must one.

https://www.netspi.com/blog/technical/web-application-penetration-testing/why-totp-wont-cut-it/

I do it the way you do it as well but am under no illusion it's bomb proof.

[–] [email protected] 1 points 8 months ago

I could've worded it better, that's for sure.

An attacker needs some form of access to your separate device. That describes it more accurately.