How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website.
The System
For the sake of explanation, assume the website is hosted at domain test.com.
Think of this system as a &qu… Continue reading How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

Alternatives for password where at least one secret is not know by the server, with similar transparency

Some service like Bitwarden use the password to encrypt part of your personal data, so that nobody except you can access it, and they archive this because the server only gets your password’s hash from your login prompt the server never kn… Continue reading Alternatives for password where at least one secret is not know by the server, with similar transparency

Can Sending All Possible Otp Codes Within 1 Second Bypass Server Protections? [duplicate]

I’m exploring the security implications of OTP (One-Time Password) authentication and wondering about the effectiveness of server-side protections against brute force attacks.
If an attacker attempts to send all possible OTP codes within a… Continue reading Can Sending All Possible Otp Codes Within 1 Second Bypass Server Protections? [duplicate]

Can displaying date and time on screen upon TOTP login failure makes system more vulnerable?

We are using TOTP(https://datatracker.ietf.org/doc/html/rfc6238) for a web application to enhance the security. TOTP works on UTC. if system clock drifts OR NTP is not synced, TOTP generated by application (like MS Authenticator, or Google… Continue reading Can displaying date and time on screen upon TOTP login failure makes system more vulnerable?