Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's a difference between fluffy that's phishable (passwords) and fluff that isn't (webauthn).

Not all fluff is equal.



How is Webauth'n Crunch not phishable?

Most implementations throw about 20 "recovery codes" at you and at the absolute fucking worst possible moment while the user is trying to do something urgent, they say "save these in a secure place right now".

It's not 1, but 20 passwords that ALL give access to your account. Where do you think those codes go?

They are not only phishable, but they usually end up in a Google doc, screenshotted and pasted to Notion, or some other insecure place.


We're talking about webauthn, not recovery codes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: