
TOTP od Turistu
A TOTP generator that could be used with gmail, github and other sites which require 2FA.
Pro používání tohoto rozšíření potřebujete Firefox
Metadata rozšíření
Snímky obrazovky














O tomto rozšíření
This is a javascript implementation of a TOTP authenticator, using the browser's crypto API. It should do the exactly same thing as google's authenticator, the "oathtool --totp -b ..." command, or any other TOTP generating app.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
Ohodnoťte svou zkušenost
Další informace
- Odkazy doplňku
- Verze
- 1.2.8
- Velikost
- 12,99 KB
- Poslední aktualizace
- před rokem (22. lis 2023)
- Příbuzné kategorie
- Licence
- Pouze GNU General Public License v3.0
- Historie změn
Přidat do sbírky
Poznámky k verzi 1.2.8
since the half-fix was back ported to ESR and thunderbird, assume that selectAllChildren() doesn't set the primary selection on *any* version of firefox anymore.
Další doplňky od autora Turistu
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno