this post was submitted on 04 Mar 2024
63 points (90.9% liked)

Open Source

31223 readers
281 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
 

As I updated the version to 1.4.0 , adding the 'import' feature I am sharing this here.

I made this extension because I couldn't find one that wouldn't ask for too much permissions (such as accessing all websites data).

Eventually I found it nice to have a TOTP that can really be audited, the code is 649 lines of JS, 214 CSS and 52 HTML. Feel free to fork, copy part of it, contribute or just request fix/features.

I have used it for more than a year every day and it works nicely.

you are viewing a single comment's thread
view the rest of the comments
[–] erAck@discuss.tchncs.de 4 points 8 months ago (11 children)

Hell no, having OTP in the browser kinda defeats all 2FA and makes it 1FA again.

[–] pastermil@sh.itjust.works 4 points 8 months ago (6 children)

If the thread model involve physical device access, then yes. However, consider that the attacker might not have access to the device with this 2FA.

[–] erAck@discuss.tchncs.de 1 points 8 months ago (1 children)

It's enough if they have access to the browser.

[–] pastermil@sh.itjust.works 0 points 8 months ago (1 children)

You're gonna need to access the device for that

[–] erAck@discuss.tchncs.de 1 points 8 months ago (1 children)

It's probably sufficient to be able to take over the browser remotely.

[–] pastermil@sh.itjust.works 1 points 8 months ago (1 children)

Can you elaborate on that? Any source?

[–] erAck@discuss.tchncs.de 1 points 8 months ago (1 children)
[–] pastermil@sh.itjust.works 1 points 8 months ago

You don't know what you're talking about, do you?

load more comments (4 replies)
load more comments (8 replies)