Comment on Tutorial - The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
Comment Added by : Joe Bloggs
Comment Added at : 2013-04-22 13:40:24
Comment on Tutorial : The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
All true, but the 2FA that has been implemented for some years by my bank (Barclays) requires transaction details (e.g. amount and destination account number) to be keyed into the authentication token (which has its own keypad) and the signed response to be keyed into the website.
The token uses the crypto module on my bank card's chip, so is a relatively cheap device interchangeable which is between all of the bank's customers.
This mitigates against both trojans and MITM as it prevents the attacker from performing any malicious activity once logged in without somehow getting me to enter their chosen amount and account number into the signing device (albeit they can still view my account statements, which may also be undesirable).
I'm pretty sure that Barclays are not the only bank in the UK to adopt this approach, and would be surprised if other countries had not also followed suit. Of course, the US are still to adopt chips on bank cards, so are many years behind the rest of the world on this one.
- Data Science
- Cloud Computing
- Java Beans
- Mac OS X
- Office 365
- Tech Reviews
4. It must be the last thread to finish execution. Wh
View Tutorial By: Abinash at 2013-07-16 06:37:11
6. pls give us aprogram of postfix and infix using st
View Tutorial By: lost_hope1111 at 2009-02-13 01:48:37
7. Nice example but does not work on me, after execut
View Tutorial By: Junjie Zhang at 2012-01-10 03:26:12
8. Been hearing about this for quite long. This gives
View Tutorial By: Lolip at 2011-08-24 08:40:20
10. Can anybody tell.... what if condition is doing in
View Tutorial By: Randhir Sambyal at 2013-08-26 06:37:25