cross-posted from: https://lemmy.ml/post/12744832

As I updated the version to 1.4.0 , adding the ‘import’ feature I am sharing this here.

I made this extension because I couldn’t find one that wouldn’t ask for too much permissions (such as accessing all websites data).

Eventually I found it nice to have a TOTP that can really be audited, the code is 649 lines of JS, 214 CSS and 52 HTML. Feel free to fork, copy part of it, contribute or just request fix/features.

I have used it for more than a year every day and it works nicely.

    • fl42v@lemmy.ml
      link
      fedilink
      arrow-up
      7
      ·
      10 months ago

      Does it, tho? It’s like “smth you know + smth you have” (although knowing or being able to remember most paswords is also quite often a bad idea, but I digress); so you have a device and know [the password for the password manager which knows] the password.

      Besides, given that logic, to not defeat the purpose of 2fa you’ll have to have another smartphone just to run aegis or something

      • AYO_Official@lemmy.mlOP
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        10 months ago

        There is an irony in password managers that stores your password but need a password (passphrase would be better). A password for your passwords. Fundamentally this is because the only secured space, only you can get in and no one else, is your own brain.

        Most password leaks are usually caused by bad implementations on the server side. I have an authentication protocol to avoid many password leakages I’d like to share one day (double salt, one from client, one on server so password is never shared to the server).

    • Pantherina@feddit.de
      link
      fedilink
      arrow-up
      3
      ·
      10 months ago

      No it doesnt, it is a password and a secret stored on that device. A password might get stolen on the database, or entered on a fishing website, but with 2FA that would be useless.

      It goes against ONE idea of 2FA, that phones are more secure (thanks Android) and your Browser might get hacked.

      • Katlah@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        10 months ago

        If your computer gets compromised and you store your passwords on it (as most do) then you are also storing your 2fa on it, then there is no 2fa.

        • AYO_Official@lemmy.mlOP
          link
          fedilink
          arrow-up
          1
          ·
          10 months ago

          If your computer is compromised whatever token/cookie you will get from the authentication will be also compromised.

          Assuming the computer is compromised also open a lot more issues, privilege escalation can be done in a lot of ways depending of what is being installed (even sudo was hit by such issues https://www.cve.org/CVERecord?id=CVE-2021-3156 )

          • Katlah@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 months ago

            whatever token/cookie you will get from the authentication will be also compromised

            This assumes you are already logged in. If you aren’t logged in then 2FA will protect you, unless of course you store your 2FA in your browser like an idiot.

            a lot more issues

            Okay but that isn’t relevant at all.

            • AYO_Official@lemmy.mlOP
              link
              fedilink
              arrow-up
              1
              ·
              edit-2
              10 months ago

              Sorry I had in mind you login in from a computer that was compromised (without your knowledge), I didn’t had in mind a computer compromised without being in use.

              EDIT : store your 2FA in the browser from the extension would not be ‘like an idiot’ as it is encrypted.

              EDIT 2 : no forget everything, this whole situation is absurd. If your computer is compromised your password are not (do you store in clear text?!). If you use it to login you are owned already.

      • Lojcs@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        10 months ago

        Even if it’s not more secure it’s extra effort nevertheless. But as you said even without that it still removes an entire vector of attack