Editing 2522: Two-Factor Security Key

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 42: Line 42:
 
** A popular item at one time for financial logins is a {{w|Security token|numeric key fob}}. Displaying a {{w|rolling code}} of numbers that change pseudorandomly, synchronously with the expectations of the authentication routine at the server. Any attempt by an eavesdropper to {{w|replay attack|'replay'}} a previous code will no longer be valid.
 
** A popular item at one time for financial logins is a {{w|Security token|numeric key fob}}. Displaying a {{w|rolling code}} of numbers that change pseudorandomly, synchronously with the expectations of the authentication routine at the server. Any attempt by an eavesdropper to {{w|replay attack|'replay'}} a previous code will no longer be valid.
 
** A printed set of {{w|one-time password}}s has a similar intention, gaining technical simplicity but also additional problems/susceptibilities.
 
** A printed set of {{w|one-time password}}s has a similar intention, gaining technical simplicity but also additional problems/susceptibilities.
βˆ’
** Hybrid solutions such as {{w|Google Authenticator}} and a possibly similar one from {{w|Okta (company)|Okta}}, and other examples of mostly mobile applications (software tokens) implementing some kind of {{w|One-time_password|one-time password}} (OTP) algorithm for authentication.
+
** Hybrid solutions such as {{w|Google Authenticator}} and a possibly similar one from {{w|Okta (company)|Okta}}.
βˆ’
*** This might be time-based OTP (TOTP), which means that the code is valid only for a short time.
+
** Prior to uniquitous use of the internet (or other dial-in networks), software companies might protect their products with a {{w|software protection dongle}} to replace or augment the more easily-sharable licence keys(/passwords) and enforce the use of no more copies than had been paid for. - With the advent of the connectivity needed, a "phone home" technique has largely replaced the necessity of this, a central server vetting the use (and/or transfer) of sofware between machines. But {{w|Universal 2nd Factor|related technology}} is a modern implementation that is ''probably'' what Cueball's keyringing efforts involve.
βˆ’
** Prior to ubiquitous use of the internet (or other dial-in networks), software companies might protect their products with a {{w|software protection dongle}} to replace or augment the more easily-sharable licence keys(/passwords) and enforce the use of no more copies than had been paid for. - With the advent of the connectivity needed, a "phone home" technique has largely replaced the necessity of this, a central server vetting the use (and/or transfer) of sofware between machines. But {{w|Universal 2nd Factor|related technology}} is a modern implementation that is ''probably'' what Cueball's keyringing efforts involve.
 
 
** A device similar to the fob/dongle could also use short-range wireless communications (Bluetooth, RFID, Near-Field Communication or some proprietry method) to indicate the proximity (and identity) of the token to a receptive system. Some high-end car models offer such a system in place of an ignition key for... some absolutely valid reason.{{citation needed}}
 
** A device similar to the fob/dongle could also use short-range wireless communications (Bluetooth, RFID, Near-Field Communication or some proprietry method) to indicate the proximity (and identity) of the token to a receptive system. Some high-end car models offer such a system in place of an ignition key for... some absolutely valid reason.{{citation needed}}
 
** With "Remember my password" options in browsers and {{w|password manager}}s, ostensibly to prevent over-the-shoulder attacks and/or the prevalence of weak passwords, increasingly the 'known' password has become more of a possession tied to a particular device (and any other device that has been linked by the synchronisation of such internal information).
 
** With "Remember my password" options in browsers and {{w|password manager}}s, ostensibly to prevent over-the-shoulder attacks and/or the prevalence of weak passwords, increasingly the 'known' password has become more of a possession tied to a particular device (and any other device that has been linked by the synchronisation of such internal information).

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)