Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> 1. I genuinely don't understand why.

You never make a mistake? Never ever? It's a question of numbers. If the likelihood of making a mistake is 1 in 10000 emails, send out links to 10.000 package maintainers, and you've got a 63% chance of someone making that mistake.



Your point is completely valid. Tangent: in your example, what calculation led to "63%"?


1-(.9999)^10000

I trust the user did this calculation. I didn't.


That's indeed the formula. The .9999 is (1 - 1/10000), 1/10000 being the likelihood. It would perhaps have been clearer if I had chosen two different numbers...


Then hardware 2FA won't help.


This seems to be a common misunderstanding.

The major difference between passkeys and hardware 2fa (FIDO2/yubikeys) and TOTP/SMS/Email solutions is that the passkey/yubikey _also_ securely validates the site it's communicating with before sending validation, making traditional phishing attacks all but impossible.


Hardware 2FA, with something like passkeys (or even passkeys with software tokens), _would_ prevent this as they are unique to the domain by construction so cannot be accidentally phished (unlike TOTP 2FA).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: