Jump to content

Jennifer Lawrence, Mary Elizabeth Winstead hacked: How safe are your cloud photos and data? |Note :Don't post links of nude leaked pictures


vvvslaxman

Recommended Posts

Google also has a mobile phone app - you can't rely on SMS/voice call when you're traveling. https://support.google.com/accounts/answer/1066447?hl=en
I find it amazing that something like this exists which can be copy whole hardware info :fear: Well I will not use this app I will rather just allow one my my device to not use 2 step like I did with laptop and once u are signed in you do not really need it anyway
Link to comment
Share on other sites

I find it amazing that something like this exists which can be copy whole hardware info :fear: Well I will not use this app I will rather just allow one my my device to not use 2 step like I did with laptop and once u are signed in you do not really need it anyway
It depends - if you add the device as a trusted device you won't need one to login for the next 30 days.
Also wait ...won't you need data to receive code in this app anyway ? Also won't I receive SMS when someone tries to use it ?
It's based on time. The app generates a code, you don't get a SMS if you use the app. https://code.google.com/p/google-authenticator/
Link to comment
Share on other sites

It depends - if you add the device as a trusted device you won't need one to login for the next 30 days. It's based on time. The app generates a code, you don't get a SMS if you use the app. https://code.google.com/p/google-authenticator/
But obviously it will be based on device hardware and cannot be copied ? I mean time wil be same for everyone but code different Or maybe combination of hardware and ur id ...maybe u can explain me how they do it :cantstop:
Link to comment
Share on other sites

But obviously it will be based on device hardware and cannot be copied ? I mean time wil be same for everyone but code different Or maybe combination of hardware and ur id ...maybe u can explain me how they do it :cantstop:
I don't think it's based on device hardware but rather your communication with the web service (like Google). Time +/- (username + password) More technical details here. https://tools.ietf.org/html/rfc4226 https://tools.ietf.org/html/rfc6238
Link to comment
Share on other sites

I don't think it's based on device hardware but rather your communication with the web service (like Google). Time +/- (username + password) More technical details here. https://tools.ietf.org/html/rfc4226 https://tools.ietf.org/html/rfc6238
But here is the thing we have not heard that police device can receive 2 step authentication we just know they can see iCloud stuff which is not protected by it I will be surprised if it's based on password as entire point of it is that if you lose password and get account hacked u still behave this layer of security
Link to comment
Share on other sites

But here is the thing we have not heard that police device can receive 2 step authentication we just know they can see iCloud stuff which is not protected by it I will be surprised if it's based on password as entire point of it is that if you lose password and get account hacked u still behave this layer of security
2FA is an extra layer of security IF your web account gets hacked. It is hardware protected - as in the sense that you need to tell if you're using it from iOS or Android. It can't be strict hardware protected - 2FA device with iPhone4S and X id. There are multiple reasons for it - the most primarily being web services do not manufacture your hardware. Google has limited access to iOS as an OS.
Link to comment
Share on other sites

×
×
  • Create New...