From a2eb412894353f0294b6d3928c6ef8e0c3ae7b22 Mon Sep 17 00:00:00 2001 From: KyleDOT Date: Sun, 16 Jun 2024 20:57:51 +0930 Subject: [PATCH] Style fixes --- blog/2024-06-07_MFA-i.html | 2 +- blog/style.css | 8 +++++++- 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/blog/2024-06-07_MFA-i.html b/blog/2024-06-07_MFA-i.html index 5715957..36fefe6 100755 --- a/blog/2024-06-07_MFA-i.html +++ b/blog/2024-06-07_MFA-i.html @@ -11,7 +11,7 @@

Anecdotally I kept seeing certain numbers and patterns showing up in 2 digit MFA that I regularly use, notably double of adjacent numbers, so I started plotting them out, while I only have 80 data points from the last couple months. I believe it's slowly confirming my theory, could still be coincidence is at play with the low amount of data compared to the 90 possible outcomes, but if not I'm curious to as why they aren't a fair or even random.

- Data graph + Data graph

I suppose the actual number isn't actually what is important to security, just that it's another layer of security, so even if the numbers are weighted to more friendly and easy to enter, bad actors will still need the user's device or convine the user to tell them the number. Just as long as you can't predict the next number with certainty when the current expires, it doesn't really matter how random the number is, just random enought that the next can't be predicted.

Note: I also believe this is true of a 6 digit I use regularly as (again anecdotally) I've picked up what I believe are patterns, unpredictable but still user friendly. I figured I track the 2 digit as it's easier to keep track of. Not all MFA would use the same number generation so some might be a more 'true' random while others like the one I'm plotting maybe weighted.

I've made this 'Part i' as I wish to return to my theory and findings once I have more data.

diff --git a/blog/style.css b/blog/style.css index e47a5b5..88db498 100755 --- a/blog/style.css +++ b/blog/style.css @@ -1,7 +1,7 @@ body {background-color: #0f1a30;} h1 {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: center;} h2 {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: left;padding-left: 100px} -h3 {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: left;padding-left: 100px} +h3 {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: center;} p {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: center;} a {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: center;} @@ -18,7 +18,13 @@ a {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: center;} .blog_theme { grid-area: blog_theme; } .blog_head { + h3 {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: left;padding-left: 100px} } .blog_body { p {color: white;font-family: Tahoma, Verdana, sans-serif;text-align: left;padding-left: 20%;padding-right: 20%;} } +.img_center { + display: block; + margin-left: auto; + margin-right: auto; + } \ No newline at end of file