
TOTP nga Turistu
A TOTP generator that could be used with gmail, github and other sites which require 2FA.
Që të përdorni këtë zgjerim, ju duhet Firefox-i
Tejtëdhëna Zgjerimi
Foto ekrani














Rreth këtij zgjerimi
This is a javascript implementation of a TOTP authenticator, using the browser's crypto API. It should do the exactly same thing as google's authenticator, the "oathtool --totp -b ..." command, or any other TOTP generating app.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
Vlerësoni rastin tuaj
Më tepër të dhëna
- Lidhje shtese
- Version
- 1.2.8
- Madhësi
- 12,99 KB
- Përditësuar së fundi më
- një vit më parë (22 Nën 2023)
- Kategori të Afërta
- Licencë
- Vetëm GNU General Public License v3.0
- Historik Versionesh
Shtojeni në koleksion
Shënime hedhjeje në qarkullim për 1.2.8
since the half-fix was back ported to ESR and thunderbird, assume that selectAllChildren() doesn't set the primary selection on *any* version of firefox anymore.
Më tepër zgjerime nga Turistu
- Ende pa vlerësime
- Ende pa vlerësime
- Ende pa vlerësime
- Ende pa vlerësime
- Ende pa vlerësime
- Ende pa vlerësime