Bitcoin Forum

Other => Beginners & Help => Topic started by: OcTradism on June 26, 2020, 01:50:03 PM



Title: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on June 26, 2020, 01:50:03 PM
People usually care about increasing their funds, their capital but do neither care about losses nor pay attention to protect their funds/ capital. There are some reasons why they don’t care about it.
-   Don’t aware of risks if they don’t protect their accounts.
-   Don’t have knowledge.
-   Being too lazy (aware of risks, have knowledge, but they don’t do anything to secure accounts).

How many types of authenticators?
-   SMS-based/ Email-based/ Voice-based/  Biometric-based authenticator
-   2-factor authenticators (2FA)
-   FIDO U2F hardware authenticators

Which one is recommended to use and should be your first priorities?
2-factor authenticator softwares. They are free and more secured. Try to use Yubikey if you actually want to secure better with some funds.
Don't use SMS-based authentication if you can do it. Unfortunately sometimes you don't have choice because service providers (like banks) don't only give you that type of authentication. As being said, whenever you can avoid this type, avoid it.

The first type is less secured and more risky because there are SIM swapping attacks (for SMS, voice code) and if you rely on email, your account will be compromised if hackers have access to your email.
[BEWARE] Sim Port Attack (https://bitcointalk.org/index.php?topic=5146701.0) and SIM swapping protection (https://paxful.com/blog/bitcoin-sim-swapping-protection/)
With SMS-based authenticator, you can secure it better by set up PIN code for your SIM card, deactivate lock-screen notifcations. More details in the guide from Kaspersky. (https://www.kaspersky.com/blog/2fa-notification-trap/23819/)

Biometric-based authenticator is risksy because if you pass away, your family members can not get access to your account.



The second type is more secured and is the one should be used. Most of them use the OATH TOTP (Time-based One-Time Password) algorithm.
There are some softwares for you. More details (https://www.kaspersky.com/blog/2fa-practical-guide/24219/)

Google Authenticator: Android, iOS
Duo Mobile: Android, iOS
Microsoft Authenticator: Android, iOS
Free OTP: Android, iOS
Authy: Android, iOS, Windows, macOS, Chrome
Yandex.key: Android, iOS
Aegis (https://getaegis.app/): Android
When using those apps, there are mandatory steps to do: backup 2FA codes (to recover later if your phones / devices broken and can not be prepaired), and test the validity of those backup codes (make sure that you make good backups and they can be used to recover).

Some people don't know these two important and vital steps. They activate 2FA on their accounts, enter 2FA codes to apps, but don't back those codes and don't test backup's validity. If their devices are stolen or broken, they get troubles.

Some advice for 2FA
- Make backups of 2FA codes before activating it
- Activating it by manually entering 2FA codes, don't scan QR code.
        Because when you entering 2FA code manually, you also check the validity of your code backup.
        If your code backup is not correct, you can not activate the code for your account.
- Retest code backup on another device if possible.
- Don't take a photo and store code backup on your device. There are risks that your devices can be compromised and photo or backup will be leaked.
- Install 2FA app on your another device, and it should mostly be offline. Don't store all eggs in one bag.

Remember that there are two layers of backup: backup codes, and 2FA secrect key (or bar code). I advise you to do backup for both of them, or if you choose only one to backup, it should be 2FA secret key, not barcode. With secret key, you will be easier to guess if character, figure are blurred a little bit but with bar code, it is almost nothing to do. Of course, saving 2FA secret key backups as best as possible is the must thing to do.

Store them offline.

Backup codes

2FA secret keys


FIDO U2F hardware authenticators: YubiKey and others
U2F hardware tokens are the darling of security specialists, primarily because, from a user perspective, they work very simply. To get started, simply connect the U2F token to your device and register it in a compatible service. The whole process takes just a couple of clicks.
It is not an exact comparison but you can imagine 2FA-app and Yubikey like non-custodial wallet softwares (Bitcoin Core, Electrum) and hardware wallets.

Buy at Yubico's store (https://www.yubico.com/store/)
Using your Yubikey with authenticator codes (from Yubico.com) (https://support.yubico.com/support/solutions/articles/15000006419-using-your-yubikey-with-authenticator-codes)
How to use a Yubikey (from wired.com) (https://www.wired.com/story/how-to-use-a-yubikey/)
2FA HW security keys, Yubikey&such (https://bitcointalk.org/index.php?topic=5223442.0)



Sources:
Aegis Authenticator, a decent alternative to Google Authenticator and Authy (https://bitcointalk.org/index.php?topic=5192978.0)
Traditional Authentication, 2FA and 2SV (https://bitcointalk.org/index.php?topic=5256264.0)
[TUTORIAL] Generate 2FA with Keepass (instead of Authenticator App)  (https://bitcointalk.org/index.php?topic=5248019.0)
2FA practical guide (https://www.kaspersky.com/blog/2fa-practical-guide/24219/) and 2FA notification trap (https://www.kaspersky.com/blog/2fa-notification-trap/23819/) (from Kaspersky.com)
5 different two-step authentication methods to secure your online accounts (https://www.howtogeek.com/232598/5-different-two-step-authentication-methods-to-secure-your-online-accounts/) and What is two-factor authentication and should I be using it (https://www.howtogeek.com/117047/htg-explains-what-is-two-factor-authentication-and-should-i-be-using-it/) (from howtogeek.com)
https://authy.com/what-is-2fa/
https://techlog360.com/two-factor-authentication-2fa/
Good topics on security and privacy (https://bitcointalk.org/index.php?topic=5239098.0)
https://bitcasino.io/blog/cryptocurrency/what-is-2fa-and-why-is-it-so-important-



Updates

https://twofactorauth.org/

https://twofactorauth.org/  that listed plenty of entities (including  cryptocurrency) which implemented 2FA  and separated them through out realms like Banking, Betting, Finance, Email etc, 32 titles in all. Those realms can  be even filtered by Regions. It can be run nay locally https://github.com/2factorauth/twofactorauth



Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Charles-Tim on June 26, 2020, 06:17:48 PM
Some people screen shot the 2FA backup QR codes including the backup words and characters, some also store the back up on their phones note, this is a poor and a non recommended way to back up 2FA, instead, you should do the paper printing, laminate it and put it in a place safe from damage and intruders(hackers)

We need to also be careful of hackers. Any device our wallets or our 2FA apps are installed, we need to make it safe from malware, trojan horse is able to reveal the 2FA code, also are some malware like rootkit that can reveal detail informations stored on your device, in this way, it can steal the 2 FA backup screen shot.

Make sure your device is free from malware, and do a paper printed 2 FA backup.

There is one also I will like you to include, andOTP 2 factor authenticator, it is also good and open source.



Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Bitcoin_Arena on June 26, 2020, 11:07:35 PM
Another most important point is that the Authentication software or authentication should totally be on a separate device from the one you use to log into your accounts or APPs. Keeping the Authentication software in the same device you use to log into your accounts kills the purpose authentication
For example. If you usually use your computer to log into your accounts, your Authentication software/app should be in a separate device like your tab or mobile phone that you don't use for logging into your accounts.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: GreatArkansas on June 27, 2020, 02:53:47 AM
For the first time, I tried to use Two-Factor-Authentications (2FA) I tried Google 2FA in my android phone and after few months I switched to Authy since Authy you can input your email address or phone number there.
Did anyone get ideas which is much better of these two? Or the difference between them? Google 2FA and Authy. I still didn't explore so much about Authy 2FA.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on June 27, 2020, 03:48:47 AM
For the first time, I tried to use Two-Factor-Authentications (2FA) I tried Google 2FA in my android phone and after few months I switched to Authy since Authy you can input your email address or phone number there.
Did anyone get ideas which is much better of these two? Or the difference between them? Google 2FA and Authy. I still didn't explore so much about Authy 2FA.
I am not sure about the difference but I saw mk4 commented with this post and I think he makes a point that storing private things yourself is better. It is not only about 2FA backups but generally also about synchronisation over devices. I don't want to sychronise everything I do over devices. If one of my devices is compromised, my data will be leaked. That's not good.
Why not use Authy? If having your 2FA backups stored on a company's servers is fine with you, then by all means go with Authy. But if you prefer storing your 2FA backups yourself, through an encrypted flashdrive and such, then try out Aegis.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: smyslov on June 27, 2020, 07:00:32 AM
For the first time, I tried to use Two-Factor-Authentications (2FA) I tried Google 2FA in my android phone and after few months I switched to Authy since Authy you can input your email address or phone number there.
Did anyone get ideas which is much better of these two? Or the difference between them? Google 2FA and Authy. I still didn't explore so much about Authy 2FA.

It's highly recommended that you put the safest and proven authentication on your emails and wallets, it's part of your education to understand how hackers attacks and what are the vulnerable point, in your online ventures, always get updates about security and the tools you are using and you are good to go and you can sleep soundly.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on June 27, 2020, 08:30:41 AM
QR code backup is bad. Indeed, you should use secret code (in characters) for your backup, instead of QR code.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: minairia3 on June 27, 2020, 10:06:29 AM
QR code backup is bad. Indeed, you should use secret code (in characters) for your backup, instead of QR code.
Im using it as back up for my some of my crypto asset wallet. How can you say QR code has likely more potential than in character type? When you use it for transaction, simply the confirmation would be guaranteed unlike character that you will used a copy paste method that have malware changing the address when you paste it.

I would be interested if you can expound the reason for this.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: jademaxsuy on June 27, 2020, 10:31:20 AM
QR code backup is bad. Indeed, you should use secret code (in characters) for your backup, instead of QR code.
It is true. I never ever use qr code when storing 2FA secret codes. I'd rather use the code itself and write on a paper for example or store it on a flash drives then you can keep it safe from leaking. It seems you are using google authenticator. Is it because where you can sync your account from the current device to other device which in my opinion is good but it also have disadvantage where the company that create that platform may have access to your credentials which is bad. I have been using google auth and Authy for 2 years.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on June 27, 2020, 12:22:08 PM
Why ( :o real bewildered look on my face)? QR code is just a specific mapping of secret code expressed in characters. I can’t tell the difference between them when it’s a matter of choosing backup. But, at the same time, QR code ensures better  data security  when transferring across devices.
When the map is broken, you have nothing to recover your 2FA but with secret key, if one of characters is blurred or broken, you still can guess it from the leftover of broken character.
Remember that there are two layers of backup: backup codes, and 2FA secrect key (or bar code). I advise you to do backup for both of them, or if you choose only one to backup, it should be 2FA secret key, not barcode. With secret key, you will be easier to guess if character, figure are blurred a little bit but with bar code, it is almost nothing to do. Of course, saving 2FA secret key backups as best as possible is the must thing to do.

Im using it as back up for my some of my crypto asset wallet. How can you say QR code has likely more potential than in character type? When you use it for transaction, simply the confirmation would be guaranteed unlike character that you will used a copy paste method that have malware changing the address when you paste it.
They are different things here: backup and transaction. What I meant is backup, not for transactions. For transactions, you should check a few first and last charaters. Checking a few in middle or whole characters if you want to do so.
How to lose your Bitcoins with CTRL-C CTRL-V (https://bitcointalk.org/index.php?topic=5190776.0)

Correct me if I am wrong (I could be wrong). Thanks.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Charles-Tim on June 27, 2020, 01:06:28 PM
It is true. I never ever use qr code when storing 2FA secret codes. I'd rather use the code itself and write on a paper for example or store it on a flash drives then you can keep it safe from leaking. It seems you are using google authenticator. Is it because where you can sync your account from the current device to other device which in my opinion is good but it also have disadvantage where the company that create that platform may have access to your credentials which is bad. I have been using google auth and Authy for 2 years.
You still do not give valid reason why QR code is not good for 2FA backup.

or store it on a flash drives then you can keep it safe from leaking
This method is not good enough, you can  write it down on a papar like you have ones said, you can laminate it for more safety.

When the map is broken, you have nothing to recover your 2FA but with secret key, if one of characters is blurred or broken, you still can guess it from the leftover of broken character.
When backing up QR code, the secret code is included.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on June 27, 2020, 01:39:10 PM
Google Authenticator: Android, iOS
Duo Mobile: Android, iOS
Microsoft Authenticator: Android, iOS
Free OTP: Android, iOS
Authy: Android, iOS, Windows, macOS, Chrome
Yandex.key: Android, iOS
Aegis (https://getaegis.app/): Android
Most of these are not open source and do not allow proper encrypted back ups. Google Authenticator in particular is awful from the regard. FreeOTP is no longer in development. Here are the apps you should be using:
Android - Aegis (https://getaegis.app/) or AndOTP (https://github.com/andOTP/andOTP)
iOS - Tofu (https://www.tofuauth.com/) or Authenticator (https://mattrubin.me/authenticator/)

authy makes backup easier, it has a secure cloud for the backup
Cloud storage is frequently hacked, and should not be used for sensitive data or back ups. A better option is to use one of the apps I listed to make an encrypted back up locally.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: libert19 on June 27, 2020, 01:41:19 PM
I relate to type 3 (being too lazy lmao), anyway I used to use Google authenticator but the access of codes on app open, no encryption and hassle of backup made me switch to Aegis. It's much better.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on June 27, 2020, 02:29:00 PM
Google Authentication is basically good there's no problem here
Except it isn't open source and it doesn't allow you to make secure, encrypted back ups. Not to mention it's owned and operated by Google, the worst company on the planet when it comes to respecting users' privacy.

Choose one of the free and open source alternatives I listed above.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Luzin on June 28, 2020, 06:48:59 AM
The first type is less secured and more risky because there are SIM swapping attacks (for SMS, voice code) and if you rely on email, your account will be compromised if hackers have access to your email.
Some exchanges combine email and 2fa. My experience when logging in to bittrex or indodax I have to confirm the email, after that enter the 2fa code. Make it longer but it looks safer. It takes 2 steps to confirm that it is the legal owner of the account. Unfortunately this is done when the IP address changes, if every time log in must be confirm email and 2fa, I think that's good.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on June 28, 2020, 06:52:41 AM
Some exchanges combine email and 2fa. My experience when logging in to bittrex or indodax I have to confirm the email, after that enter the 2fa code. Make it longer but it looks safer. It takes 2 steps to confirm that it is the legal owner of the account. Unfortunately this is done when the IP address changes, if every time log in must be confirm email and 2fa, I think that's good.
It will be required if you log in your account on a new device or with a new IP address. Log in on same device and same IP address don't force you to confirm the login activity by email confirmation.

Binance has a similar requirement too.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on June 30, 2020, 09:55:02 AM
If someone is scared of Google then Authentication can be installed on the old smartphone and used when radio-module is deactivated.
True, but I still think it's a better option to just avoid Google products altogether. Further, if you use a device with no connectivity, you will have to manually make sure the clock is accurate, as any drift from the real time can result in incorrect codes being generated.

The data it holds  can be sealed by biometrics
Biometrics are one of the least secure forms of protecting data, with many fingerprint and facial scanners being fairly easy to fool or bypass. Better to secure your 2FA with a strong password.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Lordhermes on June 30, 2020, 03:05:38 PM
I find it easy to use 2FA because it's not stressful and easily understandable, the email and phone number security method are somehow open to hackers and many user had fall victim of such attack. Could rememeber when unknown users sent withdrawal request to my email due to the fact that I haven't set authentication method.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Luzin on June 30, 2020, 03:37:32 PM
, with many fingerprint and facial scanners being fairly easy to fool or bypass. Better to secure your 2FA with a strong password.
How can? many articles that discuss biometrics are the authentication of the future. Code theft will be difficult, although this can happen.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: chinedu4210 on June 30, 2020, 06:08:25 PM
I highly recommend google authentication for your encryption, u have a total control of your account without intruder gaining access to your account.
The QP code backup can be compromised and your data forever lost.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on June 30, 2020, 07:06:42 PM
How can? many articles that discuss biometrics are the authentication of the future. Code theft will be difficult, although this can happen.
There are multiple problems with biometrics.

First, how easy they are to break. You leave your fingerprints on everything that you touch, including the very device you are using biometrics to unlock. An attacker can print a 3D model of your finger good enough to fool the most advanced fingerprint readers in a matter of minutes. Have a look at this: https://imgur.com/gallery/8aGqsSu. Face scanning on many phones can be beaten with a simple photo, like one of the ones most people have posted all over the internet and their social media accounts.

Second, if you are in the US (and some other jurisdictions - check your own), law enforcement can force you to unlock a device using your fingerprint or face. They cannot force you to hand over your passwords.

Third, biometrics can never be changed if they are hacked or compromised like a password can.

There is a reason that phones require you to enter your PIN or password after you reboot them before you can use your biometrics again. Biometrics are not secure.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: Luzin on July 01, 2020, 02:53:25 PM
First, how easy they are to break. You leave your fingerprints on everything that you touch, including the very device you are using biometrics to unlock. An attacker can print a 3D model of your finger good enough to fool the most advanced fingerprint readers in a matter of minutes.
Yes you are right, get fingerprints from there. But I think this is also difficult and like in hollywod movies. This requires direct objects, so it is difficult to get fingerprints online, except for hacking database storage for authentication files.

Second, if you are in the US (and some other jurisdictions - check your own), law enforcement can force you to unlock a device using your fingerprint or face. They cannot force you to hand over your passwords.
I think about this coercion carried out by law as a result of illegal actions, other passwords can also be unlocked, if forced to be recognized by law and the owner gives it.

Sorry, this is just my opinion. Corrected me if I'm wrong.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on July 09, 2020, 02:40:21 PM
This requires direct objects, so it is difficult to get fingerprints online, except for hacking database storage for authentication files.
Sure, but hardly anyone is using a fingerprint scanner directly connected to their home computer to unlock an account on an online website. Almost everyone is using a fingerprint scanner to unlock their phone which contains their 2FA app. If someone steals your phone then they can reconstruct your fingerprint from the fingerprints you have left on the phone itself and then use that to unlock it. Fingerprint scanners on phones are only one step above writing your PIN on a sticky note and attaching it to your bank card. Use passwords.

if forced to be recognized by law and the owner gives it.
"And the owner gives it" is the crucial point here. Law enforcement can physically restrain you and use your fingerprint or face to unlock your phone. They can't do that with passwords.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: tvplus006 on July 13, 2020, 08:43:57 PM
I find it easy to use 2FA because it's not stressful and easily understandable, the email and phone number security method are somehow open to hackers and many user had fall victim of such attack. Could rememeber when unknown users sent withdrawal request to my email due to the fact that I haven't set authentication method.

2FA and email address combined is a very good authentication method. But in this case, you need to be more responsible about the security of your phone. If it is lost, the fraudster can get access not only to 2FA, but also to your E-mail, that will help them get full control of your account.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: jerry0 on October 06, 2020, 04:27:40 PM
Which two factor is the best?  Google authenticator or just Authy?


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on October 06, 2020, 04:35:18 PM
Which two factor is the best?  Google authenticator or just Authy?
Try to use better apps that need to be open-source.

Most of these are not open source and do not allow proper encrypted back ups. Google Authenticator in particular is awful from the regard. FreeOTP is no longer in development. Here are the apps you should be using:
Android - Aegis (https://getaegis.app/) or AndOTP (https://github.com/andOTP/andOTP)
iOS - Tofu (https://www.tofuauth.com/) or Authenticator (https://mattrubin.me/authenticator/)


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: cryptowhitewalker on October 26, 2020, 03:53:27 PM
This is a resourceful advice OP, i can't emphasize on how you will be appreciated by many for clearing this out. 2FA are always a better solution to any other digital authentication alternative out there. SMS has it risk as well as the Biometrics.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: masulum on October 30, 2020, 12:34:21 PM

2FA and email address combined is a very good authentication method. But in this case, you need to be more responsible about the security of your phone. If it is lost, the fraudster can get access not only to 2FA, but also to your E-mail, that will help them get full control of your account.

I'm also thinking about this few times before, and I don't have any good option rather than my current ways. So basically I'm using Eset Mobile Security (not promoting them/affiliate with them, just sharing my way), that allow me to lock my phone in case lost with pairing to other phone number. the command also easy just send a sms from paired number to number on our lost phone.

I don't know how safe using this third party, at least I can locked my phone from other device easily without internet. And using this service i can locked our important application such as our 2FA. (DWYOR&DYOR)


about using open source 2FA, unfortunatelly, most of service currently using Google 2FA even no more updates for this service. How we can choose other 2FA if the site still using Google 2FA, maybe someone can give any explanation more about this, since lot of people says if Google 2FA not save etc, but exchange still prefer to use this service, how we (as user) can move to open source?


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on October 31, 2020, 10:18:55 AM
about using open source 2FA, unfortunatelly, most of service currently using Google 2FA even no more updates for this service. How we can choose other 2FA if the site still using Google 2FA, maybe someone can give any explanation more about this, since lot of people says if Google 2FA not save etc, but exchange still prefer to use this service, how we (as user) can move to open source?
There is nothing special about Google 2FA. Any 2FA app should work.

Very simply, when you set up 2FA, the site displays for you a shared secret. This is usually in the form of a QR code, but sometimes it is a string of characters. Ideally sites will show you both - a QR code you can scan with your app and a string of characters you can write down as a back up. When you need to enter the 2FA code in the future, your app will combine that shared secret with the current time (floored to the nearest 30 seconds), hash it, and use part of the result to generate your 6 digit 2FA code. The website will do the same thing, and check that what you have entered matches what they have calculated.

The process for combining the secret with the time and hashing it is standardized, and all 2FA apps and websites do it the same way. (There is more info here if you are interested: https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm). Given that, although the website says Google 2FA, any good open source 2FA app should work. See my post on the previous page of this thread (https://bitcointalk.org/index.php?topic=5258244.msg54692249#msg54692249) for some good open source 2FA apps.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: masulum on October 31, 2020, 12:29:34 PM
Thank you for your explanation how it works, but the main issue not about how it works, but how we can use open source 2FA if most of service currently just have Google 2FA on their services?. So far, I'm just seeing it on service i use no other 2FA options except SMS/email  verification.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on October 31, 2020, 02:08:04 PM
Ideally sites will show you both - a QR code you can scan with your app and a string of characters you can write down as a back up.
To back up 2FA for recovery or installation on other devices, I'd prefer to choose the second method: write it down on the paper or save it in password managers like https://keepass.info/ or https://bitwarden.com/

Quote
When you need to enter the 2FA code in the future, your app will combine that shared secret with the current time (floored to the nearest 30 seconds), hash it, and use part of the result to generate your 6 digit 2FA code. The website will do the same thing, and check that what you have entered matches what they have calculated.
I got troubles with timer on my device a few times. 2FA works smooth but suddenly one day it was broken. Anytime I entered 2FA code to login account, it failed. I had to check and correct timer on my devices to help 2FA works again. I don't know reasons why timer was broken like that. Could you explain it, please.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: o_e_l_e_o on October 31, 2020, 03:05:50 PM
if most of service currently just have Google 2FA on their services?. So far, I'm just seeing it on service i use no other 2FA options except SMS/email  verification.
I'm not entirely sure what you mean here, perhaps because I do not use any Google products so I'm not aware of what their 2FA options are. If a site such as a crypto exchange says "Scan this code with your Google Authenticator App", then you should be able to use any 2FA app. I have certainly done this in the past and it works fine.

If the service only offers SMS or email verification for 2FA, then you obviously can't use an app - you can only use what the site offers. Both of these are not great choices, but you can make it slightly better by using a different email address with a different password to the one you use to log in to the account, or by using a burner phone with a number you do not use for anything else and which you never use to access the services in question.

write it down on the paper or save it in password managers like https://keepass.info/ or https://bitwarden.com/
The issue with that is if you store the password to the service in question in the same password manager. If someone can access both your password and your 2FA by compromising a single source - in this case, your password manager - then your 2FA isn't really a second factor at all, it is both factors rolled in to one.

I had to check and correct timer on my devices to help 2FA works again. I don't know reasons why timer was broken like that. Could you explain it, please.
I can't explain the specifics, but the way that most 2FA apps work is to take the current time, round it down to the nearest 30 seconds, and use that along with the shared secret to generate a code. Therefore, the code will change every 30 seconds as the time updates every 30 seconds. If the clock on your device and the clock on the service are out of sync with each other by 30 seconds, then the code you generate will always be different to the code the service is generating, and so they will never match until you resync your timer.


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: masulum on November 01, 2020, 12:11:30 AM
If a site such as a crypto exchange says "Scan this code with your Google Authenticator App", then you should be able to use any 2FA app. I have certainly done this in the past and it works fine.

I understand now, the point is we can scan Google 2FA barcodes with other applications running 2FA. So far, I thought that if the choice of service was only Google 2FA, then we could only use Google 2FA. From your explanation, I tried to scan the 2FA key (on the service mentioned Google 2FA) using aegis on my phone and it worked. I just understood this today, and I was wrong all this time thinking that Google's 2FA can only use Google. Thank you very much for this knowledge


Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: xenon131 on November 16, 2020, 04:17:50 PM




Title: Re: Authentication: Types, Risks/ Attacks, Advice
Post by: OcTradism on November 30, 2020, 06:11:11 AM
Hi, could you add to OP this resource https://twofactorauth.org/  that listed plenty of entities (including  cryptocurrency) which implemented 2FA  and separated them through out realms like Banking, Betting, Finance, Email etc, 32 titles in all. Those realms can  be even filtered by Regions. It can be run nay locally https://github.com/2factorauth/twofactorauth
It is a new website and helpful for authentication on our devices. I did not know it if you don't tell me.

For newbies who use exchanges, merchants, marketplaces, set up your 2-factor authenticators is important to protect your account and money, prevent potential hacks. SMS code should not be used after your account registration, email verification and if you decide to activate 2FA for your account. Choose good 2FA app and backup the code for recovery.