this post was submitted on 13 Mar 2026
789 points (97.9% liked)

Programmer Humor

30349 readers
1334 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] TheObviousSolution@lemmy.ca 1 points 8 hours ago* (last edited 8 hours ago) (2 children)

On the other end, there is an excessive use of 2FA with systems for whom the concept of SSO seems to be a foreign thing. It's also sort of funny that 2FA can just mean using a TOTP capable password manager, reverting it back to one factor.

[–] Fiery@lemmy.dbzer0.com 10 points 5 hours ago (2 children)

It's not actually reduced to one factor, just a single point of failure. If their password manager gets taken it's a problem, however the generated TOTP is worthless in 1 min. So this will protect the login from cases where the password is known like a compromised website or a reused password.

[–] TheObviousSolution@lemmy.ca 2 points 2 hours ago* (last edited 2 hours ago) (1 children)

If the site is compromised, then the hackers could have stolen the TOTP secrets as well as the passwords. How do you think the site verifies TOTP codes? If you reuse passwords while using a password manager, you are asking for it, though.

[–] Fiery@lemmy.dbzer0.com 1 points 2 hours ago* (last edited 2 hours ago) (1 children)

A full hack of every part of the service is not the only way a user's password could get known to an attacker. Could be MiTM, could be typo-squatted, etc

If a site is that compromised no measure of auth is gonna help, so little use worrying about it.

[–] TheObviousSolution@lemmy.ca 1 points 2 hours ago* (last edited 2 hours ago)

A lot of the technology you use to connect over VPNs or over the Internet already addresses MitM. If it's typo-squatted, you are sort of using password managers wrong. You do have the option of setting up TOTP elsewhere like on your phone authenticator so the point of failure isn't on your side, I just think it's sort of funny how easily you can make it be one.

[–] Coleslaw4145@lemmy.world 0 points 5 hours ago* (last edited 5 hours ago) (2 children)

But if a password manager is compromised then doesn't the attacker also get the TOTP key which is what generates the codes in the first place?

It wouldn't matter if it expires in one minute because they'll have the token to generate the next code, as well as now knowing the password.

[–] JcbAzPx@lemmy.world 1 points 1 hour ago

That depends on the manager. Good ones won't have access to your stuff outside of an encrypted blob. Still, it's generally better to use a separate authenticator.

[–] Fiery@lemmy.dbzer0.com 4 points 4 hours ago (1 children)

That makes it a single point of failure yes, and the rest of the comment you're replying to goes into detail on what it does protect from even if both passwd and TOTP are in the password manager

[–] Coleslaw4145@lemmy.world 2 points 4 hours ago

Sorry i misunderstood what you were saying. I thought you were saying that if the password manager was compromised then the attackers would have only 1 minute to make use of the tokens before they change.

[–] killingspark@feddit.org 1 points 8 hours ago (1 children)

This. This so much. Totp based login is just two passwords where one is more annoying to use.

[–] BCsven@lemmy.ca 2 points 4 hours ago (2 children)

Not if your TOTP codes are generated by another device, then the attacker needs your password, plus the device holding the key for TOTP. If you use it on your phone and authenticator is your phone then a theif has everything when they steal your phone.

Hardware key for TOTP is a better 2FA method as its totally separate from your PC or phone

[–] TheObviousSolution@lemmy.ca 1 points 2 hours ago (1 children)

If you can get at a password by hacking a website, I wouldn't be holding out hope that they couldn't then steal the TOTP secret.

[–] BCsven@lemmy.ca 1 points 2 hours ago

I mean yes everything is hackable. Thankfully the hardware key supports FIDO where there is a public / private pair with private locked on the hardware. Not enough services support this though.

So threat is being targeted and having somebody steal the hardware key.

[–] killingspark@feddit.org 1 points 3 hours ago

As long as the default recommendation is to use authenticator apps on your main device I'll see this as a "could be good if implemented correctly, which it isn't, so it isn't good"