[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor-Friendly Two-Factor Authentication?
On Fri, Jun 10, 2016 at 10:13 PM, Allen <allenpmd@xxxxxxxxx> wrote:
> On Fri, Jun 10, 2016 at 9:58 PM, Scott Arciszewski <scott@xxxxxxxxxxxxx>
> wrote:
>
> > * FIDO U2F requires users to purchase separate hardware devices which,
> > while cheap, aren't already in the arsenal of most netizens
> >
>
> How about developing a simple 2FA app for a smartphone? Maybe a smartphone
> could emulate a FIDO U2F? Alternately, I remember some of the first 2FA
> devices were fobs that displayed a 6 digit code that changed every 15
> seconds or so, based a pseudorandom generator that had a secret seed value
> that was known by the server. A simple smartphone app design might be to
> give the user a pseudorandom seed when they create their account, the user
> inputs the seed into the app on their phone, and then when they want to
> login they have to enter a 6-8 digit code displayed by their smartphone
> app. Maybe some apps like that already exist...
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
âSince I sent my email â
âI've been
âinformed that Google Authenticator doesn't require âa Google account. It
should be universal (RFC 4226 and/or 6238)
.
âIf I encounter any difficulties, I'll revisit this thread (possibly with a
vendor-neutral implementation if it proves annoying enough).â
Scott Arciszewski
Chief Development Officer
Paragon Initiative Enterprises <https://paragonie.com/>â
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk