this post was submitted on 11 Nov 2025
292 points (87.6% liked)
Technology
76813 readers
1994 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Oh, absolutely.
Replay attack is the wrong term, here's the threat model I'm talking about. Basically, the attacker watches the authentication flow and uses the resulting session (token?) to make web requests as you, stealing whatever data it wants. There's no attack on the authentication scheme, but on the shortcuts web services use.
It doesn't matter if you use passwords, TOTP, or webauthn, there's going to be some vector to attack the system without breaking the authentication mechanism.
The average user isn't going to see much security benefit from webauthn vs TOTP in the same way that adding a better lock to your front door is unlikely to improve your overall home security, because at a certain point, the burglar will just smash a window. TOTP is good enough because it's safe from attacks on email and SMS that worse one-time code systems use. You should definitely have a lock on your door, but at a certain point, the lock is no longer the weak point in the system.
And yes, I'm using "code generation" as a generic catchall. I group auth systems like so:
If your password manager handles the second factor, the user experience of TOTP vs webauthn is nearly identical, and the security is nearly identical to your average attacker, to the point where they won't attack the authentication mechanism itself, but something else on the website or the password manager itself.
Exactly. The difference between TOTP and webauthn only really matters if you're a government or something else where state-level actors are part of your threat model. If your service uses one or the other, the distinction isn't important to the average user.