How to securely change email address in a Mobile App with Email OTP Based Login

I’m working on a mobile app where users can only log in using their email address and receive an OTP to verify their identity. I’m trying to figure out the best approach for allowing users to change their email address.
Here are the option… Continue reading How to securely change email address in a Mobile App with Email OTP Based Login

Is there an attack vector for SMS verification code using a bunch of parallel requests

I’m trying to elaborate a login scenario with SMS verification code. Not sure whether it’s an attack vector or not.
Assume, we have a N = 3 digit code sent to a user mobile phone (3-digit code just for the sake of simplicity in calculation… Continue reading Is there an attack vector for SMS verification code using a bunch of parallel requests

Whats the safest way to store 2fa/mfa secret key in database?

I try to implement a secure user login in my .net application. The first password is hashed with argon2id. The salt and the hashed password is stored in a database. SSL encryption and HttpOnly Cookie is used.
Now i want to add a multifacto… Continue reading Whats the safest way to store 2fa/mfa secret key in database?

Should OTP be resent during the sign-up process if the user is already verified?

I’m building an authentication backend API that includes a resend OTP endpoint. The question is whether the API should check if the user is already verified before sending a new OTP. Specifically, if a user has already completed verificati… Continue reading Should OTP be resent during the sign-up process if the user is already verified?

How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website.
The System
For the sake of explanation, assume the website is hosted at domain test.com.
Think of this system as a &qu… Continue reading How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card