Tagged articles
2 articles
Page 1 of 1
Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Liangxu Linux
Liangxu Linux
Nov 27, 2023 · Information Security

How TOTP Secures Your Accounts: Theory, Applications, and Python Demo

This article explains the TOTP algorithm behind time‑based one‑time passwords, outlines its security benefits and common use cases such as online logins, VPNs, and hardware tokens, and provides a practical Python implementation with code examples using the pyotp library.

OTPPythonTOTP
0 likes · 6 min read
How TOTP Secures Your Accounts: Theory, Applications, and Python Demo