SCY > 2FA, crackin, PW length + complexity

· EOG, like EOF


³ Unasked / issues / ideas #


² Good PW matter #

Millions of password attempts never hit an app.
They hit a file on attacker’s machine.

That’s why:
. password length matters more than complexity
. unique passwords matter
. password managers work
. MFA saves accounts even if password is cracked

² "False MFA" or "single-device MFA" #

³ Phone + SMS fail spirit of MFA #

✔ Technically two factors
❌ But one physical object
❌ But one point of failure

³ MFA works when factors are truly independent #

Bad MFA:
. password + SMS on same phone
. password + email OTP (same device)
. app + SMS on same phone

Good MFA:
. password + hardware token
. password + authenticator app on a different device
. password + FIDO2 / passkey
. password + push approval that requires biometric unlock

³ Best: Passkeys / hardware-backed MFA (if supported) #

Examples:
. YubiKey
. FIDO2 security key
. Passkeys stored in Secure Enclave / TPM

Why this works:
. phishing-resistant
. device-bound
. useless if phone is stolen without biometric/PIN
. no codes to intercept

³ Very good: Authenticator app (not SMS) #

Use:
. Google Authenticator
. Aegis
. Microsoft Authenticator
. Authy (with care)

Best practice:
. authenticator app locked with separate PIN/biometric
. phone auto-lock after short time
. SIM PIN enabled

Even if phone is stolen:
. attacker still needs:
. device unlock
. app unlock
. account password

³ ⚠️ Acceptable (but not ideal): SMS MFA #

Use only if:
. no other option exists

If forced to use SMS:
. Enable SIM PIN
. Disable SMS previews on lock screen
. Use strong device lock
. Enable account alerts
. Ask bank for transaction confirmation on separate channel

³ What you should do (practical checklist) #

For banking specifically:
✔ Strong device lock (PIN ≥ 6 digits or alphanumeric)
✔ Phone auto-lock ≤ 30 sec
✔ SIM PIN enabled
✔ App lock enabled (separate from phone)
✔ Prefer authenticator or hardware token over SMS
✔ Transaction confirmation step
✔ Daily transfer limits

If your bank only offers SMS MFA:
→ complain. Seriously. Banks respond to customer pressure.

³ Final truth (no marketing BS) #

. MFA is not “secure” by default.
. MFA is only secure when factors don’t fall together.

.

² Excursus: Bash: Remove tab and next line #

This text

    is copied from chatgpt.com
    
    and unordered lists are bad
    
    formatted when inserted in eg geany

³ Best solution #

. Lines starting w/ whitespace must start w/ '. ' instead
. Empty lines (or those containing only whitespace) are removed.

1sed '/^[[:space:]]*$/d; s/^[[:space:]]\+/. /'
2
3#=>  /^[[:space:]]*$/d     # delete empty or all-whitespace lines
4#=> s/^[[:space:]]\+/. /   # replace **one or more leading whitespace characters** with '. '

First idea / first step to solution #

1  sed -n '/^    /{s/^    //;p;N;d;}; p'

Purpose:

Breakdown:

  1. sed -n '...' -n flag tells sed not to print anything by default.
    You will manually control when lines are printed using p command.

  2. /^ /{ ... } This is a condition that matches lines that start with 4 spaces (^ ).
    Commands inside { ... } run only on matching lines.

  3. s/^ // On matching line — substitute (remove) 4 leading spaces from start.

  4. p Print modified current line (with those 4 spaces removed).

  5. N Append next line of input into pattern space. Now pattern space contains current line + next line.

  6. d Delete pattern space and immediately start next cycle; nothing is printed, so both current and next line are discarded from output.

  7. ; p (outside block) For all lines, including those that did not match /^ / condition, print them as -is (because of -n, lines aren't automatically printed, so this prints non-matching lines).

last updated: