50
submitted 2 years ago* (last edited 2 years ago) by StorageB@lemmy.one to c/opensource@lemmy.ml

Just wondering what people are using to meet the 2FA requirement GitHub has been rolling out. I don't love the idea of having an authenticator app installed on my phone just to log into GitHub. And really don't want to give them my phone number just to log in.

Last year, we announced our commitment to require all developers who contribute code on GitHub.com to enable two-factor authentication (2FA)...

you are viewing a single comment's thread
view the rest of the comments
[-] Dymonika@beehaw.org 3 points 2 years ago

"Time-based One-Time Password" literally says nothing about the delivery method. Who said it can't involve remote sending?

And what would you call it, then, SOTP?

Anyway, regardless of the terminology-nitpicking, my point still stands.

[-] delirious_owl@discuss.online 2 points 2 years ago

The point of being time based is to not send it. That's the whole point. To avoid that vecotor of attack.

[-] Dymonika@beehaw.org 2 points 2 years ago

Do you think the SMS codes are not time-based on the companies' ends? How are they deriving the digits, then?

[-] delirious_owl@discuss.online 2 points 2 years ago

They are not time based, correct.

[-] Dymonika@beehaw.org 2 points 2 years ago* (last edited 2 years ago)

Interesting, I didn't know that. So how do they derive the digits?

[-] delirious_owl@discuss.online 2 points 2 years ago* (last edited 2 years ago)

Best practice for a cryptographic nonce is to generate them randomly every time

this post was submitted on 05 Jun 2024
50 points (79.1% liked)

Open Source

42616 readers
49 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 6 years ago
MODERATORS