836
submitted 1 year ago by Dirk@lemmy.ml to c/programmerhumor@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] KevonLooney@lemm.ee 29 points 1 year ago

The least secure part of the sign-in process is the person. It doesn't matter what the 2FA method is.

You can be using a one time pin and someone can look at your paper and see the next one. Someone can trick your grandma into giving out the Google authenticator pin over the phone because "they're from Google". Someone can trick you into making the financial transfer yourself because "you're getting a deal".

[-] pineapplelover@lemm.ee 10 points 1 year ago
[-] redcalcium@lemmy.institute 8 points 1 year ago

Which is why sms-based 2fa is useless if you're being targeted by a motivated hacker. If you're an important person (e.g. a government official, an exec on a big corp, a celebrity, etc) it's not safe to use sms-based 2fa. Heck, even if you're nobody, a hacker might decided to target you anyway to access the company you're currently working at, or because you have something they want (e.g. a desirable Twitter handle). One call to your cellphone carrier to complain about losing phone, with some social engineering skill to dupe the minimum wage call center worker who doesn't really care about being vigilant, and suddenly the hacker gain access to your cellphone number (doubly easier to with e-sim) and thus your sms-based 2fa.

[-] pineapplelover@lemm.ee 1 points 1 year ago

TOTP or hardware based tokens ftw

this post was submitted on 23 Sep 2023
836 points (98.6% liked)

Programmer Humor

32739 readers
587 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS