• @[email protected]
    link
    fedilink
    English
    1622 hours ago

    My bank uses a TOTP and they not only block paste, they also block all typing. Instead they popup a modal with a 0-9 digit keypand and the location of each number changes every time.

    Effing obnoxious.

      • @[email protected]OP
        link
        fedilink
        1014 hours ago

        That’s a security standard theater pretending to preventing keyloggers from guessing your credentials.

        FTFY

      • @[email protected]
        link
        fedilink
        English
        516 hours ago

        The TOTP changes every time. For modern totp hashing I’m not sure how many sequential codes a keylogger would need but I’m guessing more than I will ever enter.

        Edit, asked ai for an answer to that because I was curious (maybe it’s right):

        Start AI

        That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

        To give you an idea of the scale, let’s consider the following:

        Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
        Assume the private key is 128 bits long (a common length for cryptographic keys).
        Assume the attacker uses a powerful computer that can perform 1 billion computations per second.
        

        Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.