As I updated the version to 1.4.0 , adding the ‘import’ feature I am sharing this here.

I made this extension because I couldn’t find one that wouldn’t ask for too much permissions (such as accessing all websites data).

Eventually I found it nice to have a TOTP that can really be audited, the code is 649 lines of JS, 214 CSS and 52 HTML. Feel free to fork, copy part of it, contribute or just request fix/features.

I have used it for more than a year every day and it works nicely.

    • pastermil
      link
      fedilink
      arrow-up
      4
      ·
      9 months ago

      If the thread model involve physical device access, then yes. However, consider that the attacker might not have access to the device with this 2FA.

    • DigitalDilemma@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      9 months ago

      Many/most password managers do TOTP in their browser extensions already - at least on paid tiers. (Bitwarden, Lastpass for sure).

      It’s the only way a team can effectively use TOTP, which still offers a lot of protection.

      • erAck@discuss.tchncs.de
        link
        fedilink
        arrow-up
        1
        arrow-down
        3
        ·
        9 months ago

        Lol, “the only way a team can effectively use TOTP”, really? Many paid PWMs doing it already isn’t a good excuse.

    • AYO_Official@lemmy.mlOP
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      If you have any concern I would gladly hear technical insight about the threat model involved. The cross-post on the Privacy communities sparked more conversation if you want to follow up on that point : https://lemmy.ml/post/12744864.

      Extension “authenticator” has been around for more than a decade now. I am sharing something that is small, simple, auditable and secure (no permission to do anything but past on clipboard).