[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor-Friendly Two-Factor Authentication?



On Fri, Jun 10, 2016 at 10:13 PM, Allen <allenpmd@xxxxxxxxx> wrote:

> On Fri, Jun 10, 2016 at 9:58 PM, Scott Arciszewski <scott@xxxxxxxxxxxxx>
> wrote:
>
> > * FIDO U2F requires users to purchase separate hardware devices which,
> > while cheap, aren't already in the arsenal of most netizens
> >
>
> How about developing a simple 2FA app for a smartphone?  Maybe a smartphone
> could emulate a FIDO U2F?  Alternately, I remember some of the first 2FA
> devices were fobs that displayed a 6 digit code that changed every 15
> seconds or so, based a pseudorandom generator that had a secret seed value
> that was known by the server.  A simple smartphone app design might be to
> give the user a pseudorandom seed when they create their account, the user
> inputs the seed into the app on their phone, and then when they want to
> login they have to enter a 6-8 digit code displayed by their smartphone
> app.  Maybe some apps like that already exist...
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>

âSince I sent my email â
âI've been
âinformed that Google Authenticator doesn't require âa Google account. It
should be universal (RFC 4226 and/or 6238)
.

âIf I encounter any difficulties, I'll revisit this thread (possibly with a
vendor-neutral implementation if it proves annoying enough).â


Scott Arciszewski
Chief Development Officer
Paragon Initiative Enterprises <https://paragonie.com/>â
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk