cross-posted from: https://lemmy.ml/post/12744832

As I updated the version to 1.4.0 , adding the ‘import’ feature I am sharing this here.

I made this extension because I couldn’t find one that wouldn’t ask for too much permissions (such as accessing all websites data).

Eventually I found it nice to have a TOTP that can really be audited, the code is 649 lines of JS, 214 CSS and 52 HTML. Feel free to fork, copy part of it, contribute or just request fix/features.

I have used it for more than a year every day and it works nicely.

  • lemmyreader@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    4 months ago

    Every software started with 0 reviews, by a no-name developer, with only 1 installs.

    • CameronDev@programming.dev
      link
      fedilink
      arrow-up
      12
      arrow-down
      1
      ·
      4 months ago

      This is a privacy community. Half the posters here think their toaster is listening to their thoughts. Browser extensions are a serious and known vector for malware, installing one from a no-name developer and handing it your tfa codes is a high level of blind trust.

      • lemmyreader@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 months ago

        So, are you saying you would use an add-on for OTP by a well known developer (Think about the well-known developers of No-Script and Ghostery and their history) ?

        I see no issue with the add-on of the OP being advertised because some people simply do not use phones at all, so TOTP app is not an option for them. And attack vectors via the browser only apply when the user visits shady web links.

        • CameronDev@programming.dev
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          Essentially, yeah? Unless you calculate the OTPs by pen and paper, you have to use some kind of software, and therefore you have to trust that it is safe. Writing your own like OP is actually a very safe option, because you can trust yourself, but everyone else needs to trust OP.

          Attack vectors apply to the add-on itself, it is (potentially) the shady site. OP has the potential to update the add-on later with its own malicious code. This is true of all addons, hence the trust issue.

          I dont have any problem with OP advertising their addon, but potential users should be aware of the risks.