(no title)
SpaethCo | 7 years ago
There are very few scenarios where your (high entropy) password would be compromised in a way that wouldn't also lead to the discovery of at least 1 functional 2FA code.
1) Website is breached. If they can get the account password hashes, chances are they're going to get the TOTP seeds as well.
2) You're phished. Your attacker passes through your credentials (scraping the password along the way), and they get a functional session token. With most services, you can turn off 2FA just by reconfirming the account password.
3) Your password manager is breached. 'nuff said.
The push behind 2FA isn't so much because high entropy passwords are vulnerable (except in a phishing context, but there TOTP is equally vulnerable) -- the momentum behind 2FA is because we can't convince people to stop using '123456' as a password.
yingw787|7 years ago
kerng|7 years ago
Would be curious to learn more about how it happened, to see if there are any learnings for myself to improve operational security.