Two-factor authentication system using same secrete key device and application generating different otp - qr-code

I'm currently working on a two-factor authentication system I have write some program to generate base32 secrete key and using that secrete key program will generate new time based otp in every 30 sec using same secrete key. I have pasted that secrete key which I have generate in an application to check whether the program or application both are generating same otp using that secrete key, then they are generating same otp at same time .
But when I am trying to use same code using micro python and badger2040 device I have used thonny IDE and tried to generate otp using secrete key but both are generating different otp. Why the same function running on my system correctly or not generating same otp on that device can any on tell me the reason.

Related

Can I find the code behind the 2fa-codes in MS Authenticator?

Is it possible in the Microsoft Authenticator app to retrieve the QR-code or the matching token that I once scanned for a account? I want to re-use it to add the account to a different app for 2FA.

StreamWebSocketError api_key not found, data

I'm new to flutter and i am trying to run a chat app with getstream and firebase but i keep running into errors error im running into
Make sure that your API Key is correctly entered in your code. From your Stream Dashboard you can access your Stream app's API Key and Secret. It might be that the key you're entering is for a Stream app that was deleted, or there is a typo.
Make sure that the API key for your APP there matches exactly with what you pass into your Stream client:
final client = StreamChatClient(
'YOUR-KEY', // Make sure this is correct.
logLevel: Level.INFO,
);
I noticed in the screenshot you shared that you also have a kSecretStreamKey in your code base. Your secret key is not meant to be used in your Flutter (frontend) application. The secret key is needed to perform sensitive operations on your server (backend) - for example, generating user frontend auth tokens. If you include the secret key in your Flutter codebase, you risk a malicious actor retrieving it by decompiling your application. Your Secret Key is the equivalent of a password.
I recommend taking a look at the Stream Flutter tutorial page if you're still stuck: https://getstream.io/chat/flutter/tutorial/
Or the Stream Flutter YouTube Playlist: https://www.youtube.com/watch?v=pO_MOJRqYlk&list=PLNBhvhkAJG6t-BxkRAnSqa67lm5C1mpKk

How Can I filter out a dependency failure from app insights

Since moving to Azure Key Vault to manage some keys and connection strings my App Insights Failures blade is producing errors when attempting to connect to Key vault.
The error is specifically: InProc | Microsoft.ManagedIdentity: EnvironmentCredential.GetToken
Azure.Identity.CredentialUnavailableException: EnvironmentCredential authentication unavailable. Environment variables are not fully configured.
I know what this means and it's by design. We have chosen to use Managed Identities to handle the
Key vault connection and as such we do not have any Environment Variables set in the app to connect to the Key vault. This is by design.
This image shows the default connection methods for an app service to hit Key vault, this is the default path for app services to connect to a key vault as per the MS Docs. You can see the check for Environment Credentials fails before the successful call for the Managed Identity.
So while i realize this is just tracking "how it works" i don't like to see all those failures. My question is two-fold:
does this failure REALLY take no time at all? Seems that its just "how it works"
Can i suppress this from either being collected or reported in App Insights without having to extract the data myself and use some other reporting system?

Huawei Map Kit - Certificates

Summary of our problem:
We released last week our app bundle in the Huawei AppGallery.
We used the Huawei Map Kit in order to integrate Maps. However, there seems to be a problem with map kit.
We receive the error messages:
V/HmsMapKit_MapDataVersionClient_15: build request with apiKey
D/HmsMapKit_AuthenticateClient_86: response code : 401
E/HmsMapKit_TileCache_38: startUrlRequest Identity fail, do not has permission get tile. authResult :010002
What we have done so far:
Enable mapkit in AppGallery connect
Add sha256 fingerprints of the signed bundle to the app in AppGallery conncet
Build the app with agconnect-services.json
Initializing mapkit with the api key setup on the huawei developer page
Encode the API key as below: URLEncoder.encode("", "utf-8")
Tested the rc before uploading where it worked perfectly fine
As we are having troubles in identifying the cause for our problem, it would be very helpful to get further advice.
Thank you very much in advance.
Seems to be you are.using signing by AppGallery.
If so, you have to add one more SHA-256 to project settings, which you can get from application singing settings in console
According to this Docs,It's most likely caused by the following:
When localy building apk works but store submitted apk does not work, it is most likely the signing issue.
And for App bundle signing, there are 2 ways.
AppGallery Connect generates a new signature key for your new app
App Signing allows you to upload your own signature key
NOTE
Once a signature key is generated in AppGallery Connect or uploaded by you, it cannot be modified.
so depends on the approach, you might already have a signature key that is fixed already.
and it seems in this case you have your own signature key.
when we need to use upload key to sign apk before submit to AppGallery, do not use signature key to sign for upload apk, in this case, also upload key certificate and upload key to AppGallery.
need to make sure signature key certificate and upload key certificate are correct if used.

Does using Firebase Auth login for iOS app meet 'Export Compliance Information' encryption requirement

I've seen similar questions regarding the Export Compliance Information encryption question when uploading an app with App Store Connect, but I'm still looking for a straight answer for my question. I am uploading an iOS app and have to answer the following question:
Export Compliance Information
Does your app use encryption? Select Yes even if your app only uses the standard encryption within Appleā€™s operating system.
My app has a login page that uses email and password credentials to allow users to log in if they are a user in my Firebase Authentication section of my Firebase project. I found that Firebase Authentication uses hashing for user passwords, but my question is does the inherent encryption that is part of Firebase mean I should answer yes? Or should I say no, given that I don't implement any encryption of my own. My project also uses Cloud Firestore to store client data inputted through the app.
Update: I realize encryption and password hashing are two completely separate forms of security, but my question still stands regarding info stored with Cloud Firestore.
The Firebase SDK, which is running in your app, connects to the Firebase servers over HTTPS so your app does use encryption. The encryption used is exempt so you don't need to upload any documentation to App Store Connect, but you do need to submit a year-end self-classification report.

Resources