Bitcoin Forum
November 10, 2024, 07:59:13 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: BitFunder.com has been hacked and IT IS BitFunder's fault  (Read 30140 times)
burnside
Legendary
*
Offline Offline

Activity: 1106
Merit: 1006


Lead Blockchain Developer


View Profile WWW
July 09, 2013, 12:53:26 AM
 #41

The easiest way to protect yourself would be using web applications that are coded securely. Now I'm not sure if btct.co uses an anti csrf token (I don't think it does?), but their PIN / 2 FA system makes this attack less useful (an attacker can just use JS to submit ~100 most common PINs)

Close, but not entirely correct.  Lockout gets triggered after ~5 bad PIN attempts.

Any btct.co users reading this, turn on 2FA if you can.  The PINs help but are really only placeholders for the 2FA form fields in the interfaces.

Websites are not safe for this application. Learn GPG. That is all.

I detect many suppressed lels in this statement.

GPG used incorrectly (key on your pc) is about as useful as the PINs.  It's better than nothing but a virus can grab your key easy as it can log your PIN.  Using GPG correctly via 2nd non-networked PC and sneakernet storage device is a PITA compared to gAuth or Yubikey.
🏰 TradeFortress 🏰
Bitcoin Veteran
VIP
Legendary
*
Offline Offline

Activity: 1316
Merit: 1043

👻


View Profile
July 09, 2013, 01:34:29 AM
 #42

GPG used incorrectly (key on your pc) is about as useful as the PINs.  It's better than nothing but a virus can grab your key easy as it can log your PIN.  Using GPG correctly via 2nd non-networked PC and sneakernet storage device is a PITA compared to gAuth or Yubikey.
But that's not a bad idea if you're dealing with a lot of money. You don't stuff hundreds of thousands of dollars in your mattress, do you?
burnside
Legendary
*
Offline Offline

Activity: 1106
Merit: 1006


Lead Blockchain Developer


View Profile WWW
July 09, 2013, 11:30:30 PM
 #43

GPG used incorrectly (key on your pc) is about as useful as the PINs.  It's better than nothing but a virus can grab your key easy as it can log your PIN.  Using GPG correctly via 2nd non-networked PC and sneakernet storage device is a PITA compared to gAuth or Yubikey.
But that's not a bad idea if you're dealing with a lot of money. You don't stuff hundreds of thousands of dollars in your mattress, do you?

I think the point I was trying to make is that GPG is not 2FA out of the box.  You have to follow specific practices to make it that way, and such behavior is not nearly as intuitive as the alternatives.  It is difficult enough to use that it actually encourages insecure use.

dooglus
Legendary
*
Offline Offline

Activity: 2940
Merit: 1333



View Profile
July 10, 2013, 04:19:18 AM
 #44

you could probably even implement it yourself in a few lines of any scripting language

You can do it in 7 lines of Python code:

Code:
import hmac, base64, struct, hashlib, time

def get_hotp_token(secret, number):
    h = hmac.new(base64.b32decode(secret, True), struct.pack(">Q", number), hashlib.sha1).digest()
    o = ord(h[19]) & 15
    return (struct.unpack(">I", h[o:o+4])[0] & 0x7fffffff) % 1000000

def get_totp_token(secret):
    return get_hotp_token(secret, int(time.time())//30)

Just-Dice                 ██             
          ██████████         
      ██████████████████     
  ██████████████████████████ 
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
    ██████████████████████   
        ██████████████       
            ██████           
   Play or Invest                 ██             
          ██████████         
      ██████████████████     
  ██████████████████████████ 
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
██████████████████████████████
    ██████████████████████   
        ██████████████       
            ██████           
   1% House Edge
whiskers75
Hero Member
*****
Offline Offline

Activity: 658
Merit: 502


Doesn't use these forums that often.


View Profile
July 10, 2013, 08:38:48 AM
 #45

Does this one (http://www.maxoutput.com/authenticator/) is good to use with 2-factor ?
It work with bitfunder, then I would add 2-factor on weexchange and now I can't login again, weexchange is very "unstable" like a "beta website"  Angry
Looks like it.  Wink

Elastic.pw Elastic - The Decentralized Supercomputer
ELASTIC ANNOUNCEMENT THREAD | ELASTIC SLACK | ELASTIC FORUM
Ukyo
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250



View Profile
July 10, 2013, 02:47:17 PM
 #46

Does this one (http://www.maxoutput.com/authenticator/) is good to use with 2-factor ?
It work with bitfunder, then I would add 2-factor on weexchange and now I can't login again, weexchange is very "unstable" like a "beta website"  Angry

Most likely you failed to enter the password when setting up 2-factor on weexchange, and the page reloaded changing your 2-factor code after you had already scanned it, and then you locked yourself out.

If you need help with this, pm me.

Thanks,
Ukyo
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!