Comment on Tutorial - The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
Comment Added by : Joe Bloggs
Comment Added at : 2013-04-22 13:40:24
Comment on Tutorial : The Failure of 2FA / Two-Factor Authentication By Bruce Schneier
All true, but the 2FA that has been implemented for some years by my bank (Barclays) requires transaction details (e.g. amount and destination account number) to be keyed into the authentication token (which has its own keypad) and the signed response to be keyed into the website.
The token uses the crypto module on my bank card's chip, so is a relatively cheap device interchangeable which is between all of the bank's customers.
This mitigates against both trojans and MITM as it prevents the attacker from performing any malicious activity once logged in without somehow getting me to enter their chosen amount and account number into the signing device (albeit they can still view my account statements, which may also be undesirable).
I'm pretty sure that Barclays are not the only bank in the UK to adopt this approach, and would be surprised if other countries had not also followed suit. Of course, the US are still to adopt chips on bank cards, so are many years behind the rest of the world on this one.
View Tutorial
- Data Science
- Android
- AJAX
- ASP.net
- C
- C++
- C#
- Cocoa
- Cloud Computing
- HTML5
- Java
- Javascript
- JSF
- JSP
- J2ME
- Java Beans
- EJB
- JDBC
- Linux
- Mac OS X
- iPhone
- MySQL
- Office 365
- Perl
- PHP
- Python
- Ruby
- VB.net
- Hibernate
- Struts
- SAP
- Trends
- Tech Reviews
- WebServices
- XML
- Certification
- Interview
categories
Related Tutorials
Java program to get location meta data from an image
Program using concept of byte long short and int in java
Update contents of a file within a jar file
Tomcat and httpd configured in port 8080 and 80
Count number of vowels, consonants and digits in a String in Java
Student marks calculation program in Java
Calculate gross salary in Java
Calculate average sale of the week in Java
Vector in Java - Sample Program
Archived Comments
1. This Tutorial website is very usefull in my java p
View Tutorial By: V.GeorgeFernandas at 2012-11-26 13:20:59
2. good.....not bad. .show me more programs.
View Tutorial By: saranya at 2011-12-07 08:49:39
3. the difference is of great important for new comme
View Tutorial By: ramesh shetty at 2013-03-12 15:27:23
4. EJB's can be deployed on multiple servers and when
View Tutorial By: Tomek at 2011-09-12 12:29:07
5. i m new in java plz send some programs of java usi
View Tutorial By: supriyo at 2009-09-02 02:03:38
6. /* File name : Employee.java */
public abst
View Tutorial By: Anonymous at 2012-11-16 12:23:17
7. but it will be very simple if we use pointer in it
View Tutorial By: Hot Water Systems at 2009-06-01 03:51:48
8. Hallo.
And if the certificate is se
View Tutorial By: Mario at 2009-11-11 08:42:46
9. Well the code is good but what if students start e
View Tutorial By: nitin kumar sharma at 2015-07-15 06:58:18
10. sir plz give ur sugissions for my golden future in
View Tutorial By: sridevi at 2012-06-06 10:26:36