this post was submitted on 23 Sep 2023
836 points (98.6% liked)

Programmer Humor

32721 readers
305 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 29 points 1 year ago (1 children)

The least secure part of the sign-in process is the person. It doesn't matter what the 2FA method is.

You can be using a one time pin and someone can look at your paper and see the next one. Someone can trick your grandma into giving out the Google authenticator pin over the phone because "they're from Google". Someone can trick you into making the financial transfer yourself because "you're getting a deal".

[–] [email protected] 10 points 1 year ago (1 children)
[–] [email protected] 8 points 1 year ago (1 children)

Which is why sms-based 2fa is useless if you're being targeted by a motivated hacker. If you're an important person (e.g. a government official, an exec on a big corp, a celebrity, etc) it's not safe to use sms-based 2fa. Heck, even if you're nobody, a hacker might decided to target you anyway to access the company you're currently working at, or because you have something they want (e.g. a desirable Twitter handle). One call to your cellphone carrier to complain about losing phone, with some social engineering skill to dupe the minimum wage call center worker who doesn't really care about being vigilant, and suddenly the hacker gain access to your cellphone number (doubly easier to with e-sim) and thus your sms-based 2fa.

[–] [email protected] 1 points 1 year ago

TOTP or hardware based tokens ftw