• 9 Posts
  • 206 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle


  • Worst thing? Someone with access to your password can now break into the associated account, and use that access to snoop or potentially permanently lock you out. E2EE data could be lost forever if they change the password and 2FA.

    More likely? Unless you reuse passwords, or the associated site has been recently compromised, pretty low odds of compromise. If you suspect your 2FA has leaked, just get a new secret, easy peasy. Most reputable sites should alert you to a login on a new device, potentially giving you time to react or alerting you of snooping.

    If your secret leaks without context on what site it’s associated with, then unless your name is Taylor Swift, odds of someone associating it to a site, let alone the matching password, are astronomical.










  • Per Brave:

    slip banana peel 1980s comedy movie

    The classic comedy gag of slipping on a banana peel has been a staple in entertainment for decades. In the 1980s, this gag was featured in several comedy movies. One notable example is the 1983 film “Trading Places” starring Eddie Murphy and Dan Aykroyd. In the movie, a character played by Jamie Lee Curtis slips on a banana peel, leading to a series of comedic events.

    Another example is the 1985 film “The Sure Thing” starring John Cusack and Daphne Zuniga. In this movie, a character played by John Cusack slips on a banana peel while trying to impress a girl, leading to a series of awkward and humorous moments.

    The banana peel gag has also been featured in several other 1980s comedy movies, including “The Blues Brothers” (1980) and “Caddyshack” (1980). These films showcase the enduring popularity of this comedic trope and its ability to bring laughter and entertainment to audiences.

    AI-generated answer. Please verify critical facts. Learn more









  • capture the generated codes and time of input in some way, then brute force hashes until they generate one that produces the correct codes at x time

    Given a TOTP key is usually at least 18 characters for a 6-digit code, having only one data point sticks you with something on the order of 10^28 possible keys for a given singular code (way more if case sensitive). You’d need to be regularly intercepting TOTP codes to brute force your way to the right key, and even then it’d only be valid for a single site. At that point it probably means you’ve fully compromised the connecting device or server, at which point, why do you even need the TOTP again?