Viewing a single comment thread. View all comments

uwu2420 t1_j29uncq wrote

I’m a reverse engineer (mostly as a hobby) so I welcome the challenge should I need that at some point. :)

Although… it’s well known in information security to not roll your own cryptography or to rely on security by obscurity. And in my experience, most proprietary 2FA apps do use some form of standard 2FA algorithm, they might just be using a proprietary way of sharing the 2FA secret, have undocumented APIs for rolling secrets, or are using lesser-known (but still, standardized) 2FA algorithms like HOTP, which are all reasonably easy to figure out for a determined enough developer.

3

golden_bear_2016 t1_j29w5qh wrote

If you manage to do it, please let me know. Would be more than happy to buy you a coffee if you have the steps.

Right now I have sort of a workaround that's pretty janky and not reliable enough.

3