8 Matching Annotations
  1. Apr 2026
    1. Jak działają kody 2FA?
      • Core Concept: 2FA adds a second layer of security by requiring something the user knows (password) and something they possess (a device generating codes).
      • Offline Functionality: The most interesting technical aspect is that 2FA applications (like Google Authenticator or Aegis) work entirely offline after an initial secret key exchange.
      • HOTP (HMAC-based One-Time Password):
        • Relies on a Secret Key (K) known by both the server and the client.
        • Uses a Counter (C) that increments every time a new code is generated.
        • The code is generated using an HMAC function (typically with SHA-1) and a process called Dynamic Truncation (DT) to turn a large hash into a readable 6-digit number.
      • TOTP (Time-based One-Time Password):
        • This is the standard for most modern apps. It is essentially HOTP, but replaces the manual counter with the current time (T).
        • Time is measured in steps (usually 30 seconds), allowing the server and phone to stay synchronized without communicating.
      • Security Considerations:
        • Secret Key: If the secret key (often shared via QR code) is intercepted, an attacker can generate codes indefinitely.
        • Algorithm Integrity: Standard 2FA relies on SHA-1, which, while technically "broken" for some cryptographic uses, remains secure for the short-lived, 6-digit nature of OTPs.
      • Implementation Steps: For a programmer, implementing 2FA involves:
        1. Generating and storing a unique secret key for a user.
        2. Displaying it as a QR code (Base32 encoded).
        3. Verifying the user-entered 6-digit code by running the same HOTP/TOTP algorithm on the server side.
  2. Apr 2024
    1. Finally, EL PASSO supports multi-device scenarios. It en-ables users to easily register new devices (e.g., laptop, phone,tablet) and supports easy identity recovery in case of the theftof one device. It natively supports 2FA: An RP may requestand assess that users connect from two different devices inorder to sign on their services (multi-device support).
  3. Mar 2024
  4. Aug 2022
  5. May 2021
  6. Jan 2021
    1. TAP-AND-GO - Just tap YubiKey 5 NFC to NFC-enabled Android, Windows 10 and iOS devices and applications | YubiKey 5 NFC also slips into any standard USB-A portDURABLE - Fiberglass reinforced bodies and military-grade hardened gold protect YubiKey from everyday life | YubiKey 5 NFC features water and crush resistancePORTABLE - Fit YubiKey on a keyring and carry without any worryWORKS - YubiKey 5 Series Works with the most web services
    1. The Yubico Developer Program provides resources for organizations implementing strong authentication. We offer free workshops, documentation, implementation guides, APIs and SDKs. Join our mailing list to get early access to resources for implementing the FIDO2, WebAuthn specification.