Yeah, they overlap since I did whole hour (120 30-second codes). I didn’t know specific time, so it’s 2 pages, 3 hours, 42 minutes and 30 seconds.

Credit goes to oathtool (and LibreOffice Write).
Font: Liberation Mono

  • MotoAsh@piefed.social
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    21 hours ago

    aaaaalmost completely. Knowing a second piece of information technically counts, it’s just like … about as secure as using someone’s SSN for the 2fa, which is absolutely stupid.

    • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.orgOP
      link
      fedilink
      English
      arrow-up
      7
      ·
      21 hours ago

      about as secure as using someone’s SSN for the 2fa

      I’ll give you one better. For a certain thing, the university I attend decided to use birth numbers as a password. And that was the only factor.
      Mind you, in Slovakia, the birth number consists of birth date + random 4 digits.
      Much safety.

      Anyway, SSN doesn’t expire in less than 4 hours.

      • MotoAsh@piefed.social
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        21 hours ago

        That’s why it’s ‘about’ as stupid. Many US services only really need basic PII to at least set up an account, which is scarily low levels of security.

    • yetAnotherUser@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      18 hours ago

      No? Two separate pieces of information aren’t two factors.

      But this would be the factor “ownership” and “knowledge”. Anyone attempting to hack into OP’s account needs both the paper (or a copy thereof) AND the password. Just like withdrawing money from ab ATM requires the card and a PIN.

      Though the fact you can easily copy the paper makes it a pretty weak “ownership” factor. Just like how using eye color would be a pretty weak “identity” factor.

    • Sanctus@anarchist.nexus
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      21 hours ago

      You know employees are taping this to their cubicle lol all it would take is some white hat grabbing it off your desk before you all have to do special training from IT

        • Sanctus@anarchist.nexus
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          21 hours ago

          Most 2FA is software on someone’s phone, like Microsoft Authenticator. Its not different from leaving a device. It is very different from leaving your phone.

          • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.orgOP
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            21 hours ago

            I don’t follow what you’re trying to say here. (The last 2 sentences contradict in my mind)

            Anyway, phone vs this tomfoolery, it might not be more/less secure, just different.
            What’s on paper is all there will be, as it doesn’t include the secret for generating additional codes.
            Phone has that, but also has a screen lock. Whether that is easy to bypass will depend on environment, but after the first unlock, it is at least realistic.
            Plus you have people like my father who go by “no lock, nothing to hide”.

            For immediate exploit, paper looses.
            For later persistent exploitation, phone looses.

            Also, no one’s going to have endless scrolls of codes like this. 2 pages for less than 4 hours. Round that up to 2 hours per page, that would be 12 pages per day, 360 pages per month, 4,380 pages per year.
            I had to do this, because it was a requirement (they even recommended to print out the password). Actually, they didn’t mention 2FA, just to print out the password (and no use of personal devices). This is the best I could do given the environment.

            • Sanctus@anarchist.nexus
              link
              fedilink
              English
              arrow-up
              3
              ·
              19 hours ago

              There are purposed 2FA devices that aren’t your phone. Leaving one of those laying around is about the same security level as leaving these papers is what that says. Either way that sounds like ass to deal with regardless of how secure it is. Give me Aegis or give me death.