|
Message-ID: <CALnMstVp_RBB8Wc_=SEHbqhjcTQGjTkFPxtyQhc3VJHD7QXqFw@mail.gmail.com>
Date: Fri, 29 Mar 2019 19:26:50 +0300
From: Anton Dedov <adedov@...il.com>
To: passwords@...ts.openwall.com
Subject: Re: UX/security of TOTP configuration process
> if it could be used it is not ONE TIME then u r lying to yourself.
Pardon, I did not get it.
пт, 29 мар. 2019 г., 19:07 e@...tmx.net <e@...tmx.net>:
> On 03/29/19 17:03, Anton Dedov wrote:
> > Hello folks!
> >
> > A question on implementing TOTP 2FA in an application.
> >
> > Is it ok to ask users to backup TOTP secret in a secure place during 2fa
> > configuration process? Or it's better to provide one-time recovery codes?
> >
> > The argument against TOTP secret backup can be an assumption that if the
> > secret leak it can be maliciously used without victim user ever noticing
> it.
>
> if it could be used it is not ONE TIME then
> u r lying to yourself.
>
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.