Aestu wrote:
Calling BS. All NSA work is top secret and it's very illegal to disclose even the existence of a contract, and they probably front their work through puppet companies.
Authenticators are self-contained. They can't be "disrupted" or "rendered useless". A hacker with a ton of time and processing power could get enough codes from packet sniffing to guess at the authenticator's cipher, but there would be no point in doing so unless someone can spend months and millions of dollars on hacking one account.
Not totally true. I actually did used to work for a military contractor in a network security research group and one of our clients was the A COMPANY IN MARYLAND. Not all of A COMPANY IN MARYLAND work is necessarily top secret. And after holding a security clearance you start to realize that top secret is really not that big of a deal. It took me a year to get my Top Secret SCI lifestyle polygraph for the A COMPANY IN MARYLAND after all of the background checks went through. It took me a shorter amount of time to get something called Secret SAP. The SAP portions of all projects I worked on were much more classified than any Top Secret work I did.
Also, without getting into too much detail about the authenticator technology (and without doing any research), they are time hashed in a way. Also why you cannot substitute authenticators. Each one probably has their serial number incorporated into the key. Then when you press your authenticator button it takes that number (+whatever salt) and modifies it by the time you press it (also probably date). When you enter that into the login, the server does the same calculation, if the numbers match, then you are set.
In order to break that you are going to need the salt, the serial number, the exact time (to the second or possibly millisecond) along with the login user email and password. It is definitely possible, but when you compare the worth to what you are trying to crack, the initiative drops way down.