this post was submitted on 23 Sep 2023
829 points (98.6% liked)
Programmer Humor
32375 readers
425 users here now
Post funny things about programming here! (Or just rant about your favourite programming language.)
Rules:
- Posts must be relevant to programming, programmers, or computer science.
- No NSFW content.
- Jokes must be in good taste. No hate speech, bigotry, etc.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The least secure part of the sign-in process is the person. It doesn't matter what the 2FA method is.
You can be using a one time pin and someone can look at your paper and see the next one. Someone can trick your grandma into giving out the Google authenticator pin over the phone because "they're from Google". Someone can trick you into making the financial transfer yourself because "you're getting a deal".
Sim swapping
Which is why sms-based 2fa is useless if you're being targeted by a motivated hacker. If you're an important person (e.g. a government official, an exec on a big corp, a celebrity, etc) it's not safe to use sms-based 2fa. Heck, even if you're nobody, a hacker might decided to target you anyway to access the company you're currently working at, or because you have something they want (e.g. a desirable Twitter handle). One call to your cellphone carrier to complain about losing phone, with some social engineering skill to dupe the minimum wage call center worker who doesn't really care about being vigilant, and suddenly the hacker gain access to your cellphone number (doubly easier to with e-sim) and thus your sms-based 2fa.
TOTP or hardware based tokens ftw