So I've been researching how two-factor authentication works and turns out it's pretty simple and can be even implemented on a TI-84+CE since it has a real-time clock and a CPU fast enough to compute the necessary hashes.
Should I get started with implementing that?
If you are using 2FA anywhere, you'll know that the application on your phone generates a 6-digit temporary password - and basically, your calculator can do the same with my proposed program.
Of course, my approach would probably be less secure and you shouldn't trust it for sensitive purposes, but I suppose it'll work well enough.
It would use the 16-character code that is shown when registering with Google Authenticator (sometimes separately, but mostly in a QR code - you'd need something to scan that with).
What do you think?
Should I get started with implementing that?
If you are using 2FA anywhere, you'll know that the application on your phone generates a 6-digit temporary password - and basically, your calculator can do the same with my proposed program.
Of course, my approach would probably be less secure and you shouldn't trust it for sensitive purposes, but I suppose it'll work well enough.
It would use the 16-character code that is shown when registering with Google Authenticator (sometimes separately, but mostly in a QR code - you'd need something to scan that with).
What do you think?