• @[email protected]
      link
      fedilink
      67 days ago

      Yes, shared secret based, but not a big deal because it is machine generated and unique per account. The ‘server has your credential’ is only a problem if the credential is reused across services. If you have access to read TOTP secrets from the server, you probably don’t need those TOTP secrets to further compromise the service.

      But webauthn/passkey is a better approach. Properly managed SSH keys are good too, but folks aren’t too happy about how ssh keys are commonly pretty lax. Client certificates similarly would have worked, but never took off. Similar story for smartcards.

      • @[email protected]
        link
        fedilink
        1
        edit-2
        7 days ago

        I am in the process of buying a Nitrokey 3 Mini!

        Gonna test some stuff, like Secure Element LUKS encryption on my old Thinkpad