MTOTP: Wouldn't it be nice if you were the 2FA device?
Nature and Goals of mTOTP
- Presented as an early, experimental “human-computable TOTP” under strict mental constraints, not production crypto.
- Goal: avoid ever revealing the underlying secret to a device while also not relying on any electronic token that can be compromised.
- Some find the idea intellectually neat and worth exploring; others see it more as a fun puzzle than a practical security tool.
Is It Actually 2FA?
- Many argue this is not a second factor: it reduces entirely to “something you know” plus mental computation, i.e., a password variant.
- Counter‑view: “factor” is about what you must have/know at login time; a brain-stored secret that never leaves your head can still serve as a second factor alongside, say, a password manager or SSH key.
- Ongoing disagreement over whether clonability (you can tell someone the secret) disqualifies it as “something you have.”
Security Properties and Weaknesses
- Keyspace is small (~10 billion); commenters note that 2–3 observed codes with timestamps plus brute force can recover the secret.
- Human computation can’t use high-cost key derivation; compensating with longer, random secrets quickly becomes impractical to memorize.
- Suggestions include longer passphrases, larger wordlists, or multiple rotating keys, but rotation introduces sync and complexity issues.
- Some see value mainly against phishing / replay (no static secret entered), others say the reduced search space and server-side secret storage undercut that.
Human Constraints and Usability
- Mental math each login is seen as too demanding for most users; many would likely offload it to an app, defeating the concept and leaking the secret.
- Time-based nature assumes users roughly plan login time; several doubt this is realistic behavior.
- The 6th digit is identified as a checksum / self-check, not real extra security.
Comparison to Existing 2FA Methods
- TOTP itself is “password + time-based computation,” but with a separate device and short-lived output that mitigates some attacks (password reuse, replay).
- Debate over storing TOTP seeds in password managers: convenient but collapses factors if that device is compromised.
- Hardware tokens / secure enclaves are regarded as stronger for “something you have,” but less flexible and harder to back up.
- Biometrics are criticized as non-revocable, privacy-sensitive, and often effectively tied to a device anyway.
Threat Models and Philosophy
- Several argue that what’s “correct” depends on actual attack vectors: remote password stuffing vs device compromise vs coercion (“rubber-hose”).
- Some see mTOTP as offering marginal practical security; others value it as a thought experiment probing the limits of human-only authentication.