Comment on Tutorial - The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
Comment Added by : Joe Bloggs
Comment Added at : 2013-04-22 13:40:24
Comment on Tutorial : The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
All true, but the 2FA that has been implemented for some years by my bank (Barclays) requires transaction details (e.g. amount and destination account number) to be keyed into the authentication token (which has its own keypad) and the signed response to be keyed into the website.
The token uses the crypto module on my bank card's chip, so is a relatively cheap device interchangeable which is between all of the bank's customers.
This mitigates against both trojans and MITM as it prevents the attacker from performing any malicious activity once logged in without somehow getting me to enter their chosen amount and account number into the signing device (albeit they can still view my account statements, which may also be undesirable).
I'm pretty sure that Barclays are not the only bank in the UK to adopt this approach, and would be surprised if other countries had not also followed suit. Of course, the US are still to adopt chips on bank cards, so are many years behind the rest of the world on this one.
- Cloud Computing
- Java Beans
- Mac OS X
- Office 365
- Tech Reviews
Subscribe to Tutorials
1. i wish to get some example java programs to unders
View Tutorial By: rebecca at 2010-01-09 03:14:42
3. the code works fine,i also tried the write code.th
View Tutorial By: Joy at 2013-11-25 05:24:23
5. Hi MR,are you have java code to read sms...... tha
View Tutorial By: ronized at 2008-12-29 16:59:27
7. Hi, If any body was able to send the message suces
View Tutorial By: Pradeep Singh Chouhan at 2011-03-02 23:03:05
10. You have no way of knowing when errno was last set
View Tutorial By: s.b at 2010-05-18 20:54:24