Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So you mean for example, you keep your Authenticator app on a device completely separate from your phone / disconnected from the internet?


2FA is a good option for securing your centralized accounts. But unfortunately, if you're logged in on your phone and your phone is hacked, well, it's still game over.

For crypto currencies it may help to store them on a hardware wallet, since accessing your money will require explicit interaction. But, as far as I understand (please correct me, not up to date with the security mechanisms of hardware wallets), if your computer is compromised while doing it, you can still lose it.


> if your computer is compromised while doing it, you can still lose it.

The hardware wallet itself has a screen, and requires you to confirm your transactions, so generally not true


Just for people who don’t know, it’s shows relevant data regarding the transaction: Sum, currency, target address.

Now, if you verify that data, you are safe… if the original address was correct. But as we are talking about a sophisticated targeted attack, where did you get the original address from? Because if it was your phone or your computer, we are back to step one, as that might already be manipulated.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: