Comment on Another State Lawmaker Wants To Criminalize Porn Through Age Verification
Spendrill@lemm.ee 11 months agoI agree it’s a global and concerted effort but just because they are all banging on about porn and using it as the Trojan horse, this isn’t about porn or nudity or sex.
You remember when ‘Arab Spring’ happened? And all the usual suspects said how great it was and that the internet had a democratising influence? The were welcoming the changes in the Arab world but saw the true power of the unmediated internet in those coordinated protests and vowed they’d never let it happen to them.
Within five years we’re going to see gigantic walled gardens where people can only sign in using their given name and confirming by a passport or driving license. We can already see sites where you have to use a OTP or authenticator code on a smart phone to sign in. Extrapolating your identity from that info is trivial.
I think there will be another internet available only by using other protocols but it will be forever looked down upon and payment providers will not service any monetisation there.
SupraMario@lemmy.world 11 months ago
Uhh are you assuming MFA is… somehow a bad thing?
Spendrill@lemm.ee 11 months ago
No, but it does present more data for the unscrupulous.
ItsGhost@sh.itjust.works 11 months ago
Aside from SMS/email, which should be avoided anyway for other reasons, or proprietary solutions like MS’ or Steams approach, there is nothing to be gained from TOTP or WebAuthN.
TOTP (the 6 digit code that changed every 30 seconds, usually) is just a hash of a shared secret between you and the server, and the current time rounded to the nearest 30 seconds.
WebAuthN/FIDO2/U2F is private by design. Keys/authenticators derive a unique key for every credential pair, you can even register the same key multiple times because of this. About the only thing you gain is knowing what type of authenticator is being used, which is of questionable value at best.
Spendrill@lemm.ee 11 months ago
Thank you for this, I learned something today.
I wasn’t rubbishing 2FA I was saying that in order to use it you usually need to use a mobile phone and it’s the phone that I regard as being a security risk for any number of reasons.