
TOTP wót Turistu
A TOTP generator that could be used with gmail, github and other sites which require 2FA.
Trjebaśo Firefox, aby toś to rozšyrjenje wužywał
Metadaty rozšyrjenja
Fota wobrazowki














Wó toś tom rozšyrjenju
This is a javascript implementation of a TOTP authenticator, using the browser's crypto API. It should do the exactly same thing as google's authenticator, the "oathtool --totp -b ..." command, or any other TOTP generating app.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
Pógódnośćo swóje dožywjenje
Dalšne informacije
- Dodankowe wótzkaze
- Wersija
- 1.2.8
- Wjelikosć
- 12,99 KB
- Slědny raz zaktualizěrowany
- një vit më parë (22 Nën 2023)
- Pśiswójźbne kategorije
- Licenca
- Jano licenca GNU General Public License v3.0
- Wersijowa historija
Zběrce pśidaś
Wersijowe informacije za 1.2.8
since the half-fix was back ported to ESR and thunderbird, assume that selectAllChildren() doesn't set the primary selection on *any* version of firefox anymore.
Wěcej rozšyrjenjow wót Turistu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu