Bitcoin Forum

Bitcoin => Development & Technical Discussion => Topic started by: mczarnek on May 10, 2014, 03:11:08 PM



Title: Is it possible to make decentralized 2-factor authentication?
Post by: mczarnek on May 10, 2014, 03:11:08 PM
2 factor authentication is very nice to have..  is it possible to do it in a decentralized way without trusting anyone else with the key being sent to you?

Ideally so you can in some way log in and recover your private key within a decentralized storage system or something like that.


Title: Re: Is it possible to make decentralized 2-factor authentication?
Post by: DeathAndTaxes on May 10, 2014, 08:01:27 PM
Two factor authentication systems rely on a shared secret.  I can't see how that could be done security in an anonymous decentralized network.

An encrypted file can't be accessed without the decryption key.  You could give the file to unauthorized users and the contents of the file would still be secure (to the limit of the strength of the algorithm and key).  There is no way to "bypass" this.  Math protects the contents of the file.  2FA on the other hand is just an authentication mechanism it can be bypassed.  Take blockchain.info as an example, if an attacker (or employee) gained access to the server they could simply download the wallet files.  They would still be protected by the password (key) but there would be no need to defeat the 2FA.  2FA relies on trust, it relies on the gatekeeper limiting access.  In a decentralized system the attack is also the gatekeeper and they could simply ignore that trust.


Title: Re: Is it possible to make decentralized 2-factor authentication?
Post by: jonald_fyookball on May 10, 2014, 10:13:55 PM
2 factor authentication is very nice to have..  is it possible to do it in a decentralized way without trusting anyone else with the key being sent to you?

Ideally so you can in some way log in and recover your private key within a decentralized storage system or something like that.

You'd have to have it encrypted if it was decentralized.  So then you could use a secondary private key to decrypt your primary private key...lol. Kind of circular logic.  

If you want to be able to recover information , some kind of multisig is the best way I think.