←back to thread

656 points EthanHeilman | 7 comments | | HN request time: 0.63s | source | bottom
1. unethical_ban ◴[] No.30106682[source]
TOTP is not going anywhere for much of the Internet. Hold on while I get a Yuibikey to my dad who thinks "folders can't be in other folders" because that's not how they work in real life.

TOTP is a great security enhancement, and while phishable, considerably raises the bar for an attacker.

The fact that TOTP is mentioned as a bad practice in this document is an indicator that this should not be considered a general best practices guide. It is a valid best practice guide for a particular use case and particular user base.

replies(3): >>30106810 #>>30106859 #>>30110488 #
2. adgjlsfhk1 ◴[] No.30106810[source]
the advantage of fido2/webauthn is actually biggest for non techies. tech people are the ones who won't fall for take bad phishing attempts. stopping malicious logins from fake sites is a massive win.
3. tptacek ◴[] No.30106859[source]
Yubikeys aren't the serious long-term alternative to TOTP; software keys embedded in phones are what we're going to end up with.
replies(2): >>30108684 #>>30118196 #
4. zie ◴[] No.30108684[source]
I want to disagree, but I can't, because you are right. Though perhaps as wearable tech grows(watches and what not), perhaps the keys will exist there also.
5. konklone ◴[] No.30110488[source]
The document distinguishes between enterprise-facing and public-facing systems. For enterprise-facing (government employees, contractors, etc.), it's talking about discontinuing use of TOTP. For public-facing systems, it doesn't impose any restrictions, since (as you're saying) the general public really needs options.
6. takumif ◴[] No.30118196[source]
I have a newbie question: Can't we embed a hardware key into a phone, and that'd be just as good as a Yubikey? Do we already do this, or is there a reason why we don't?
replies(1): >>30123769 #
7. totony ◴[] No.30123769{3}[source]
Laptops can have smart cards so there's no reason a phone couldn't