|
- Can we trust onetimesecret? - Information Security Stack Exchange
So for example you ask the other person to use the place you met for the first time as a password for the first layer Then you ask them something else for the second one and so on, until you are confident only the correct person could know all the answers
- secret sharing - Best method to send credentials to clients . . .
There are options to protect it with a password, to limit the number of views, to limit the time, etc Creating such an account and using this feature is free Like other methods, you can send the link in one encrypted channel, and pass the password in another channel
- How can I decode a message that was encrypted with a one-time pad?
One-Time Pad is unbreakable, assuming the pad is perfectly random, kept secret, used only once, and no plaintext is known This is due to the properties of the exclusive-or (xor) operation
- Can a Time-based One-time Password (TOTP) key be decoded from generated . . .
The HMAC-based One-Time Password (HOTP) algorithm (RFC 4226 (informational)) that forms the foundational part of TOTP says that the shared secret should be at least 120 bits in length, and recommends 160 bits for its key
- one time password - Where is the TOTP secret key stored on client . . .
I'm new to concept of TOTP, but as I understand, 16-character base32-encoded shared secret is stored in the client application (for example Authy, FreeOTP)? This means that if I remove the application, the key is lost and I can no longer generate my one-time passwords?
- authentication - Sending passwords to someone remotely - Information . . .
27 When I need to send something a single time, I have used One Time Secret It's an open-source web app that allows you to enter information that can only be viewed once After the recipient has opened the page, the information is deleted, and the only thing remaining in your chat logs or email is a bad link
- authentication - How does Google Authenticator work? - Information . . .
Google Authenticator supports both the HOTP and TOTP algorithms for generating one-time passwords With HOTP, the server and client share a secret value and a counter, which are used to compute a one time password independently on both sides
- one-time link on 1ty. me - Information Security Stack Exchange
1ty me is a website that allows you to send secret messages (password, nuclear code, etc ) to someone with a one-time link So when someone receives the link and clicks on it, the secret message is removed permanently
|
|
|