Comment on Tutorial - The Failure of 2FA / Two-Factor Authentication By Bruce Schneier



Comment Added by : Joe Bloggs

Comment Added at : 2013-04-22 13:40:24

Comment on Tutorial : The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
All true, but the 2FA that has been implemented for some years by my bank (Barclays) requires transaction details (e.g. amount and destination account number) to be keyed into the authentication token (which has its own keypad) and the signed response to be keyed into the website.

The token uses the crypto module on my bank card's chip, so is a relatively cheap device interchangeable which is between all of the bank's customers.

This mitigates against both trojans and MITM as it prevents the attacker from performing any malicious activity once logged in without somehow getting me to enter their chosen amount and account number into the signing device (albeit they can still view my account statements, which may also be undesirable).

I'm pretty sure that Barclays are not the only bank in the UK to adopt this approach, and would be surprised if other countries had not also followed suit. Of course, the US are still to adopt chips on bank cards, so are many years behind the rest of the world on this one.


View Tutorial



Related Tutorials

Java program to get location meta data from an image

Program using concept of byte long short and int in java

Update contents of a file within a jar file

Tomcat and httpd configured in port 8080 and 80

Java File

Java String

Count number of vowels, consonants and digits in a String in Java

Reverse a number in Java

Student marks calculation program in Java

Handling Fractions in Java

Calculate gross salary in Java

Calculate average sale of the week in Java

Vector in Java - Sample Program

MultiLevel Inheritance sample in Java

Multiple Inheritance sample in Java

Archived Comments

1. This Tutorial website is very usefull in my java p
View Tutorial          By: V.GeorgeFernandas at 2012-11-26 13:20:59

2. good.....not bad. .show me more programs.
View Tutorial          By: saranya at 2011-12-07 08:49:39

3. the difference is of great important for new comme
View Tutorial          By: ramesh shetty at 2013-03-12 15:27:23

4. EJB's can be deployed on multiple servers and when
View Tutorial          By: Tomek at 2011-09-12 12:29:07

5. i m new in java plz send some programs of java usi
View Tutorial          By: supriyo at 2009-09-02 02:03:38

6. /* File name : Employee.java */
public abst

View Tutorial          By: Anonymous at 2012-11-16 12:23:17

7. but it will be very simple if we use pointer in it
View Tutorial          By: Hot Water Systems at 2009-06-01 03:51:48

8. Hallo.

And if the certificate is se

View Tutorial          By: Mario at 2009-11-11 08:42:46

9. Well the code is good but what if students start e
View Tutorial          By: nitin kumar sharma at 2015-07-15 06:58:18

10. sir plz give ur sugissions for my golden future in
View Tutorial          By: sridevi at 2012-06-06 10:26:36