Readit News logoReadit News
SpaethCo commented on Cellular outage in U.S. hits AT&T, T-Mobile and Verizon users   cnbc.com/2024/02/22/cellu... · Posted by u/rooooob
jjav · 2 years ago
No, TOTP is far more secure because it has no dependence on a third-party who can mess up in many ways (Denial of service like in this case by being unavailable, Impersonation by allowing SIM swaps or intercepting messages directly).

You fully control how to store the TOTP seed and how you compute the value, so it is far more secure.

Yes, it can be phished if you fall for that, but it removes several attack vectors.

SpaethCo · 2 years ago
> Yes, it can be phished if you fall for that, but it removes several attack vectors.

How was the first factor (the password) compromised?

Assuming the user is using site-unique passwords, in 99% of cases where an attacker obtains a functional password they can get at least one TOTP code or the seed in the same manner. (ie, if I can steal your password DB, odds are pretty good for me stealing your TOTP seed DB as well.)

The outcome of a single successful authentication is a longer-lived session cookie. Once an attacker has that they can reset your creds (usually just requiring re-entering the password) and the account is theirs.

IMO, the only 2nd factor that matters are those that mutually authenticate like PassKeys / FIDO keys.

SpaethCo commented on Cellular outage in U.S. hits AT&T, T-Mobile and Verizon users   cnbc.com/2024/02/22/cellu... · Posted by u/rooooob
throwway120385 · 2 years ago
TOTP is more secure in that you can't be simjacked by someone impersonating you in the cell phone store.
SpaethCo · 2 years ago
That's assuming your attacker already has your password, or the service allows SMS password reset. (thus negating the second factor. Essentially SMS becomes the only factor.)
SpaethCo commented on Cellular outage in U.S. hits AT&T, T-Mobile and Verizon users   cnbc.com/2024/02/22/cellu... · Posted by u/rooooob
danesparza · 2 years ago
Well ... let's be honest: SMS 2FA shouldn't be a thing.

TOTP or stronger, please.

SpaethCo · 2 years ago
TOTP or SMS, it's just another text password you're entering in that's fully phishable.

TOTP just "feels" more secure.

SpaethCo commented on 100Mbps uploads and downloads should be US broadband standard, senators say   arstechnica.com/tech-poli... · Posted by u/caution
lazerpants · 5 years ago
I checked Comcast's 10k report and their margin for the segment including broadband is over 40%, which is crazy but about what you would expect from a de facto monopoly. I don't think forcing them to invest in capex to benefit customers is asking so much when they are making those kinds of margins.
SpaethCo · 5 years ago
Those margins are misleading because they're _multi_ service operators, and accounting standards require that you can only list direct costs.

Revenue is easy: how much did you take in for video? phone? Internet access?

Costs are harder because you can only include business line direct costs. Since the cable plant is used by voice, video and data services it's not a direct cost of any of them. Same thing with the service vehicle fleet, call centers, etc. Most things get saddled in "administration" categories and obscure the true cost of providing the service. As a company overall, their margins been hovering around 8-12%.

SpaethCo commented on Double Blind Passwords a.k.a. Horcruxing   kaizoku.dev/double-blind-... · Posted by u/astroanax
posix_me_less · 5 years ago
> you're just adding friction to a process that should be as frictionless as possible, because friction causes people to make bad decisions

Integrating a password manager with a browser is too fragile and risky way of using both. It is best to have them fully separated so they can't communicate. They should communicate exclusively via the user.

The login process should have some friction and should not be fully automated. Adding a secret domain-specific suffix to the password is very little friction for the user a gives obvious benefits: password manager does not know the password, it can't send it to other application (intentionally or by chance), it won't login the user by accident.

SpaethCo · 5 years ago
> Integrating a password manager with a browser is too fragile and risky way of using both. It is best to have them fully separated so they can't communicate. They should communicate exclusively via the user.

Passwords are about proving identity. Using high entropy passwords for greater confidence of user identity is only part of the equation, the user needs to be able to identify the validity of the service as well.

The greatest benefit of an autofill enabled password manager is it handles the task of URL validation before offering up credentials. When you split up that function, now it's back to relying on humans to get everything right on verifying credentials get submitted only to the intended service.

SpaethCo commented on Double Blind Passwords a.k.a. Horcruxing   kaizoku.dev/double-blind-... · Posted by u/astroanax
_wldu · 5 years ago
I wrote a program to generate passwords based on user input about 10 years ago. I still use it today and a few teams I have worked with still use it. I called it DPG. Deterministic Password Generator. It is a similar concept. I have implemented it in Go, C++, Java and Python.

I wish the idea of generating passwords when needed rather than storing and retrieving them was more popular. Traditional password Managers are just flawed.

https://github.com/62726164/dpg

SpaethCo · 5 years ago
So if a site is compromised and requires a password rotation, do you just never use that site again?
SpaethCo commented on 1Password for Linux development preview   discussions.agilebits.com... · Posted by u/terabytest
heliodor · 6 years ago
This is the kind of thing where more paranoia is better. Their service is a big fat target. I don't understand how you can't be disturbed by that.
SpaethCo · 6 years ago
All the encryption happens client-side. For this to be a problem you not only have to gain access to the blobs stored on their service, but you also have to be able to decrypt them.

I expect they probably pay more attention to abnormal access than most self-hosted users would as well, so you'd actually know about a data leak faster so you could rotate your passwords.

SpaethCo commented on SMS is not 2FA-secure   issms2fasecure.com/... · Posted by u/sergeant3
jorvi · 6 years ago
Its great functionality but it reduces your security. Say someone somehow figures out your 1Password password and security key - if you store your OTPs in Authy, your passwords are useless (well, less useful anyway). If you store your OTPs in 1Password, they have the keys to the kingdom.
SpaethCo · 6 years ago
This is technically true, but the most likely scenarios that result in the discovery of your secret key (128bits of entropy) + master password (?? additional bits) involve things like a device compromise. If your machine is compromised, you’re probably already exposed to things like session cookie stealing. At that point your attack surface is already blown wide open.

The biggest thing 2FA protects against is credential stuffing. If you’re using a password manager and have high entropy site-unique passwords, the additional entropy by TOTP is mostly moot anyway.

SpaethCo commented on Wireless Carrier Throttling of Online Video Is Pervasive: Study   bloomberg.com/news/articl... · Posted by u/pseudolus
eeZah7Ux · 7 years ago
> so you have to throttle

Not at all. TCP already does its own rate limiting without external throttling.

SpaethCo · 7 years ago
> Not at all. TCP already does its own rate limiting without external throttling.

Individually, cars brake on the freeway to avoid hitting the car in front of them.

Collectively on a busy freeway, that sets off a chain reaction that results in the familiar rush hour crawl.

Minnesota did a study in 2001 on the effect of ramp meters, and disabling the meters (ie, removing throttling) resulted in statistically significant increase in overall freeway travel times.[0]

Statistically multiplexed shared networks like mobile wireless face similar issues. For a single TCP session the only metrics that can be divined by the endpoints are round-trip time and loss. As the shared network reaches capacity, larger numbers of TCP connections all back off around the same time, but large flows are more aggressive at ramping up than smaller flow (email/instant messaging, etc) and can result in an effective breakdown of network usability. A network control that has visibility to multiple flows and awareness of capacity of the system can influence overall performance much more effectively.

Ideally mobile providers would be trying to shoot for maintaining uniform latency per flow, similar to what queuing strategies like CoDel[1] achieve, but that's likely beyond the CPU and buffering capabilities of their existing hardware. Lacking the perfect solution, it's human nature to move on to the next approach: managing the biggest problem. Video is usually easy to identify, and so it wins the "able to be managed" prize.

[0]http://www.dot.state.mn.us/rampmeter/study.html [1]https://en.wikipedia.org/wiki/CoDel

SpaethCo commented on FBI tells lawmakers it can't access Dayton gunman's phone   thehill.com/homenews/admi... · Posted by u/miles
dillonmckay · 7 years ago
How much longer will iTunes be around?
SpaethCo · 7 years ago
The backup function is moving to Finder before iTunes disappears entirely.

u/SpaethCo

KarmaCake day166December 2, 2017View Original