fortean wrote:
OTOH, one might argue that now a cracker has 4 OTPs from the same key so in effect it is LESS secure.
Interesting point, from this perspective it might be good to always validate the first
OTP against the validation server before the next OTP is requested. It might though
add some inconvenience for the user who needs to wait for the validation process
before the next OTP can be entered.
fortean wrote:
If you want to protect users against theft of their keys, simply add a second factor, e.g. a pincode, passphrase, mandatory client side certificate, TAN code etc. etc.
Yes, this is certainly an option.
Regards,
/Olov