TOTP for 2FA is incredibly easy to implement. So what’s your excuse?
Time-based one-time passwords are one of the more secure approaches to 2FA
— certainly much better than SMS. And it’s much easier to implement than
SMS as well. The algorithm is as follows:
- Divide the current Unix timestamp by 30
- Encode it as a 64-bit big endian integer
- Write the encoded bytes to a SHA-1 HMAC initialized with the TOTP shared key
- Let offs = hmac[-1] & 0xF
- … ⌘ Read more
@akoizumi@social.kyoko-project.wer.ee You should really try to get Drew Devaluat to join Yarn.social and/or maintain a Twtxt feed (same thing I guess) – But either way, it would be interesting new blood 😅
@abucci@anthony.buc.ci 2FA is kind of a necessary security requirement at this point 😅
@abucci@anthony.buc.ci Agreed 💯
@prologic@twtxt.net I mean he is very sour on Mastodon/ActivityPub, so it’s not outside the realm of possibility…
@ocdtrekkie@twtxt.net I sent him an Email 🤞