Comment by sugarpimpdorsey

3 months ago

It only proves that TOTP is useless against phishing.

Every day brings me another reason to ask the question: "Why the hell did they throw away the idea of mutual TLS?". They then went onto invent mobile OTP, HOTP, TOTP, FIDO-U2F and finally came a full cycle by reinventing the same concept, but in a more complex incarnation - Passkeys.

  • Works this way for my government and my bank. I was given a cert matching my real name and the login just asks for my cert and pulls me through (with additional 2FA for the bank). Pretty amazing if you ask me.

  • the UI for client side certificates was shit for years. no one particularly cared. passkeys however are... pretty reasonable.

    • That's just it. If any of the browser vendors put 1% of the work they spent on renewing their visual identity, remodeling their home page, or inventing yet another menu system into slightly easier to use client certificates (and smart cards) this would have been a solved problem two decades ago. All the pieces are in place, every browser has supported this since the birth of SSL, it's just the user interface bits that are missing.

      It's nothing short of amazing that nobody worked on this. It's not as if there isn't a need. Everyone with high security requirements (defense, banks etc.) already do this, but this clumsy plugins and (semi-)proprietary software. Instead we get the nth iteration of settings redesigns.

      1 reply →

    • > the UI for client side certificates was shit for years. no one particularly cared.

      That's exactly what I mean! Who would use it if the UI/UX is terrible? Many Gemini (protocol) browsers like Lagrange have such pleasant UIs for it, though somewhat minimal. With sufficient push, you could have used mutual TLS from even hardware tokens.

  • Because the tech industry egregore is a middling LLM that gets it context window compacted every generation.

TOTP isnt designed to be against phishing. Its against weak, leaked or cracked passwords.

  • Lots of junk TOTP apps in app stores.

    Once heard of a user putting in a helpdesk ticket asking why they had to pay for the TOTP app. Then I realize their TOTP seed is probably out in the open now.

    I’m sure we can imagine how else this could go badly…

Yes. This attack would not have worked if FIDO2 (or the software emulation Passkey) had been used.