This is an early experiment in human-computable TOTP. Not production crypto, but a serious attempt to reach reasonable security for plausible 2FA. Protocol revisions, criticism, and contributions are welcome.
I don't really get what tone you're doing for. Is this "a serious attempt", or is this "something that does not guarantee any cryptographic security"?
Nonetheless I do not see what issues 2FA has that this solves. Having the electronic device is the security. Without it there is no security.
I don't really get what tone you're doing for. Is this "a serious attempt", or is this "something that does not guarantee any cryptographic security"?
Nonetheless I do not see what issues 2FA has that this solves. Having the electronic device is the security. Without it there is no security.