ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    List of websites that support 2FA

    Scheduled Pinned Locked Moved IT Discussion
    21 Posts 4 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Speaking of which, are any two things that travel over the same network really two factor authentication?

      stacksofplatesS 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        I have definitely worked places where all Internet, including 4G, LTE and texting, were hijacked and monitored so any attempt at normal 2FA would result in the company getting all components of your access, even if only for a few seconds before a code timed out.

        1 Reply Last reply Reply Quote 0
        • stacksofplatesS
          stacksofplates @scottalanmiller
          last edited by stacksofplates

          @scottalanmiller said:

          Speaking of which, are any two things that travel over the same network really two factor authentication?

          I think if you have a lock on the phone it is. I have a pattern that I draw to unlock mine, then the Google Authenticator app. Esp if you have a phone with a fingerprint reader.

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @stacksofplates
            last edited by

            @johnhooks said:

            @scottalanmiller said:

            Speaking of which, are any two things that travel over the same network really two factor authentication?

            I think if you have a lock on the phone it is. I have a pattern that I draw to unlock mine, then the Google Authenticator app. Esp if you have a phone with a fingerprint reader.

            Does that travel over the same network? I thought that the Google Authenticator app was locally based, no network needed.

            Finger print reader would do nothing in my question because the data is hijacked before it ever reaches the device. The network would know your text passcode before your phone ever received it (and could even block you from receiving it if they wanted.)

            stacksofplatesS J 2 Replies Last reply Reply Quote 0
            • stacksofplatesS
              stacksofplates @scottalanmiller
              last edited by

              @scottalanmiller said:

              @johnhooks said:

              @scottalanmiller said:

              Speaking of which, are any two things that travel over the same network really two factor authentication?

              I think if you have a lock on the phone it is. I have a pattern that I draw to unlock mine, then the Google Authenticator app. Esp if you have a phone with a fingerprint reader.

              Does that travel over the same network? I thought that the Google Authenticator app was locally based, no network needed.

              Finger print reader would do nothing in my question because the data is hijacked before it ever reaches the device. The network would know your text passcode before your phone ever received it (and could even block you from receiving it if they wanted.)

              Oh I see what you're saying. Ya Authenticator is all local, its generated based on a random string given to you and the date and time.

              1 Reply Last reply Reply Quote 0
              • J
                Jason Banned @scottalanmiller
                last edited by

                @scottalanmiller said:

                I think if you have a lock on the phone it is. I have a pattern that I draw to unlock mine, then the Google Authenticator app. Esp if you have a phone with a fingerprint reader.

                Nothing is sent over the network. Google Authenticator is the same thing as having a RSA keyfob without the costs.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Jason
                  last edited by

                  @Jason said:

                  @scottalanmiller said:

                  I think if you have a lock on the phone it is. I have a pattern that I draw to unlock mine, then the Google Authenticator app. Esp if you have a phone with a fingerprint reader.

                  Nothing is sent over the network. Google Authenticator is the same thing as having a RSA keyfob without the costs.

                  That's what I was thinking. So those are not affected by network hijacking.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @scottalanmiller
                    last edited by

                    @scottalanmiller said:

                    @Jason said:

                    @scottalanmiller said:

                    I think if you have a lock on the phone it is. I have a pattern that I draw to unlock mine, then the Google Authenticator app. Esp if you have a phone with a fingerprint reader.

                    Nothing is sent over the network. Google Authenticator is the same thing as having a RSA keyfob without the costs.

                    That's what I was thinking. So those are not affected by network hijacking.

                    But the original code is transmitted to or from Google. So if the connection is hijacked from the beginning, the hijackers can have that code and put it into their own GA and it will give them the same results.

                    J scottalanmillerS 2 Replies Last reply Reply Quote 0
                    • J
                      Jason Banned @Dashrender
                      last edited by

                      @Dashrender said:

                      But the original code is transmitted to or from Google. So if the connection is hijacked from the beginning, the hijackers can have that code and put it into their own GA and it will give them the same results.

                      Over SSL.. Texting does not have encryption.

                      1 Reply Last reply Reply Quote 1
                      • scottalanmillerS
                        scottalanmiller @Dashrender
                        last edited by

                        @Dashrender said:

                        But the original code is transmitted to or from Google. So if the connection is hijacked from the beginning, the hijackers can have that code and put it into their own GA and it will give them the same results.

                        That is much, much harder and one can assume that additional precautions could be made when acquiring that service. One could, for example, make sure that whoever was attempting to hijack the Internet connection to set up the service would have no physical connection to the person hijacking a text message.

                        DashrenderD 1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          @Dashrender said:

                          But the original code is transmitted to or from Google. So if the connection is hijacked from the beginning, the hijackers can have that code and put it into their own GA and it will give them the same results.

                          That is much, much harder and one can assume that additional precautions could be made when acquiring that service. One could, for example, make sure that whoever was attempting to hijack the Internet connection to set up the service would have no physical connection to the person hijacking a text message.

                          I'll definitely give you that - but then you're still at the single device problem. Logging in from a phone, and getting a text message on the same device.

                          J 1 Reply Last reply Reply Quote 0
                          • J
                            Jason Banned @Dashrender
                            last edited by Jason

                            @Dashrender said:

                            I'll definitely give you that - but then you're still at the single device problem. Logging in from a phone, and getting a text message on the same device.

                            Same Device isn't as big of a deal.. It's more of same method of access. EX: Email is a back door to most accounts, if you have the email you can reset anything. So using the email as a place to send the 2FA login codes is just not a good idea.

                            DashrenderD 1 Reply Last reply Reply Quote 1
                            • DashrenderD
                              Dashrender @Jason
                              last edited by

                              @Jason said:

                              @Dashrender said:

                              I'll definitely give you that - but then you're still at the single device problem. Logging in from a phone, and getting a text message on the same device.

                              Same Device isn't as big of a deal.. It's more of same method of access. EX: Email is a back door to most accounts, if you have the email you can reset anything. So using the email as a place to send the 2FA login codes is just not a good idea.

                              Agreed.

                              1 Reply Last reply Reply Quote 0
                              • 1
                              • 2
                              • 1 / 2
                              • First post
                                Last post