-1

Is multi-factor authentication a privacy risk? Does it make tracking/fingerprinting easier?

It was seem so because whoever is accepting the OTP could track and record every OTP request and metadata like time, location, etc., information it may not have been able to obtain another way.

Also, since OTPs generated on different devices are different, it would seem this would enable whoever is accepting the OTP to fingerprint devices.

Geremia
  • 1,676
  • 3
  • 19
  • 33

2 Answers2

1

The OTP is generated every minute so google shouldn't be able to fingerprint the same device unless it gets more than one request within these 60 seconds.

Now lets take Google authenticator for example:

enter image description here

The app requires permissions to get full network access, which it could use, theoretically, to pinpoint location based on ip.

Nir Alfasi
  • 136
  • 7
1

Using a software application like Google Authenticator is a compromise on security made by most users of the Time-based One-Time Password (TOTP) protocol. It is a compromise made for the sake of convenience.

TOTP uses a combination of a secret key, and the time, to generate a code that can be verified by the service you are authenticating with... and which cannot be guessed by someone who does not have the secret key.

There is no network communication required for the One-time Password Generator to operate, except that which may be required initially to fetch a secret key, or synchronize the time. You'll also notice in Google Authenticator that if you have multiple tokens installed, the entire list generates keys constantly while the app is open. So there would be no means of identifying which application you are authenticating with, except to analyze where you leave your focus longest.

Ultimately, you need to be able to trust whatever app is generating your One-time Passwords. If you don't feel you can trust Google, there are other makers of TOTP applications. There are also hardware tokens (presented here as an example... not a brand endorsement). Hardware tokens are much more secure since they are single-purpose and generally tamper-resistant, but have the classic problem of making it difficult to distribute secret keys in the physical space.

In the end, using TOTP is definitely better than knowledge-based authentication - passwords and secret questions - alone, but requires you to have a trusted implementation to generate your passwords from the shared secret and the time. Google Authenticator is the convenient - but not the only choice.

nbering
  • 3,998
  • 1
  • 21
  • 22
  • So there is no way for whoever is accepting a OTP to tell device the OTP was generated on? – Geremia Apr 21 '18 at 03:04
  • 3
    Nope. All they know is you have the shared secret and the correct time (or you have astronomically good luck at guessing 6-digit numbers). – nbering Apr 21 '18 at 03:05