- cross-posted to:
- opensource@lemmy.ml
- cross-posted to:
- opensource@lemmy.ml
cross-posted from: https://lemmy.ml/post/12744832
As I updated the version to 1.4.0 , adding the ‘import’ feature I am sharing this here.
I made this extension because I couldn’t find one that wouldn’t ask for too much permissions (such as accessing all websites data).
Eventually I found it nice to have a TOTP that can really be audited, the code is 649 lines of JS, 214 CSS and 52 HTML. Feel free to fork, copy part of it, contribute or just request fix/features.
I have used it for more than a year every day and it works nicely.
So basically… completely remove the purpose of 2FA?
Does it, tho? It’s like “smth you know + smth you have” (although knowing or being able to remember most paswords is also quite often a bad idea, but I digress); so you have a device and know [the password for the password manager which knows] the password.
Besides, given that logic, to not defeat the purpose of 2fa you’ll have to have another smartphone just to run aegis or something
There is an irony in password managers that stores your password but need a password (passphrase would be better). A password for your passwords. Fundamentally this is because the only secured space, only you can get in and no one else, is your own brain.
Most password leaks are usually caused by bad implementations on the server side. I have an authentication protocol to avoid many password leakages I’d like to share one day (double salt, one from client, one on server so password is never shared to the server).
No it doesnt, it is a password and a secret stored on that device. A password might get stolen on the database, or entered on a fishing website, but with 2FA that would be useless.
It goes against ONE idea of 2FA, that phones are more secure (thanks Android) and your Browser might get hacked.
If your computer gets compromised and you store your passwords on it (as most do) then you are also storing your 2fa on it, then there is no 2fa.
If your computer is compromised whatever token/cookie you will get from the authentication will be also compromised.
Assuming the computer is compromised also open a lot more issues, privilege escalation can be done in a lot of ways depending of what is being installed (even sudo was hit by such issues https://www.cve.org/CVERecord?id=CVE-2021-3156 )
This assumes you are already logged in. If you aren’t logged in then 2FA will protect you, unless of course you store your 2FA in your browser like an idiot.
Okay but that isn’t relevant at all.
Sorry I had in mind you login in from a computer that was compromised (without your knowledge), I didn’t had in mind a computer compromised without being in use.
EDIT : store your 2FA in the browser from the extension would not be ‘like an idiot’ as it is encrypted.
EDIT 2 : no forget everything, this whole situation is absurd. If your computer is compromised your password are not (do you store in clear text?!). If you use it to login you are owned already.
Even if it’s not more secure it’s extra effort nevertheless. But as you said even without that it still removes an entire vector of attack