Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Dropbox Two-Factor Authentication Has Kinks, Users Say
Newest First  |  Oldest First  |  Threaded View
Johan1974
50%
50%
Johan1974,
User Rank: Apprentice
2/24/2013 | 10:09:13 AM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
Hi ,

I see this is an old message but i still have the same issue.
O do not have the backup code and they refuse to send me a new one to my phone. Even when i created a new account with a different email adress with the same phone number i get no help at all. The support just stops responding .

I like dropbox but because of this i quit using dropbox.
kitus
50%
50%
kitus,
User Rank: Apprentice
10/17/2012 | 9:59:08 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
Hi again,

I just received their response to my request for help. Fasten your seat belts: "Your computer is still linked to Dropbox, and you have logged into the website using two-step verification before, you should be able to launch the Dropbox website from the Dropbox icon in your menu bar or system tray. Click on the Dropbox icon and select "Launch Dropbox Website." If this logs you in then you can disable two-step verification from the security page."

I provided a very thorough response to Dropbox support indicating what had happened and all I get is a response that is of no use for me... 1 week and I'm still in square one! In this response I linked back to this website.
kitus
50%
50%
kitus,
User Rank: Apprentice
10/7/2012 | 11:28:41 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
I guess I've made a huge fool of myself, and now I can't use Dropbox to its full. My dynamic codes are not valid (I seem to have used a wrong seed), and so is my local 16-character password.

Guess what. I contacted user support and they have responded me with "Unfortunately, for security purposes, if you can't enter the two-step code, and you failed to store the emergency backup code, we have no way to help you regain access to your Dropbox account.".

I've been an early adopter of Googles 2 factor authentication and I've never had any problem whatsoever. To my surprise I seem to not only have used a wrong seed but also stored a wrong static password (which by the way I copied directly into my password manager).

Dropbox two factor authentication is worse than Google's and if they don't help me out, I'm gonna be utterly disappointed as I have gained over 12GB bringing people to Dropbox.

Can anybody please spot a way for me to solve this?

Your help would be much appreciated.

Thanks,
TS_Time
50%
50%
TS_Time,
User Rank: Apprentice
8/29/2012 | 11:12:55 AM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
Even if it is late it's nice to see that leading companies in their respective verticals are giving users the better balance between security and user experience by implementing 2FA which allows us to telesign into our accounts. I know some will claim this make things more complicated, but the slight inconvenience each time you log in is worth the confidence of knowing your files are secure. I'm hoping that more companies start to offer this awesome functionality. This should be a prerequisite to any system that wants to promote itself as being secure.
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
8/28/2012 | 11:27:47 AM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
And how do you use this new feature when you don't have a mobile phone? Dropbox should offer more options for the second layer, which would also add a bit more security. With that any hacker has to try multiple ways for the second step and if users want they should be able to have the account blocked for a day if the second method selected is not the one originally chosen.
MarkSitkowski
50%
50%
MarkSitkowski,
User Rank: Moderator
8/27/2012 | 11:59:27 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
I'm surprised that Dropbox still uses passwords. Whether you go with 2, 3, 4 or 5 factor authorisation, you'll still be vulnerable to the well-known methods of hacking the result. Also, methods like eyeball scanning, fingerprints or colonoscopy tend to be a bit user-hostile.
Two U.S banks and one in Hong Kong are implementing an authorisation method which is proof against spy cameras, network snoopers, keyloggers, and doesn't need passwords, just a user ID.
There's a nice PowerPoint thingy which describes it reasonably well at www.designsim.com.au/What_is_S....
Number 6
50%
50%
Number 6,
User Rank: Apprentice
8/27/2012 | 5:35:12 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
I'll store that 16-digit key in my Dropbox folder so I can access it anywhere from my smartph... Oh.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21866
PUBLISHED: 2021-08-02
A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger t...
CVE-2021-27499
PUBLISHED: 2021-08-02
Ypsomed mylife Cloud, mylife Mobile Application, Ypsomed mylife Cloud: All versions prior to 1.7.2, Ypsomed mylife App: All versions prior to 1.7.5,The application layer encryption of the communication protocol between the Ypsomed mylife App and mylife Cloud uses non-random IVs, which allows man-in-...
CVE-2021-27503
PUBLISHED: 2021-08-02
Ypsomed mylife Cloud, mylife Mobile Application, Ypsomed mylife Cloud: All versions prior to 1.7.2, Ypsomed mylife App: All versions prior to 1.7.5,The application encrypts on the application layer of the communication protocol between the Ypsomed mylife App and mylife Cloud credentials based on har...
CVE-2021-27943
PUBLISHED: 2021-08-02
The pairing procedure used by the Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs and mobile application is vulnerable to a brute-force attack (against only 10000 possibilities), allowing a threat actor to forcefully pair the device, leading to remote control of the TV settings and configu...
CVE-2021-29979
PUBLISHED: 2021-08-02
Hubs Cloud allows users to download shared content, specifically HTML and JS, which could allow javascript execution in the Hub Cloud instance’s primary hosting domain.*. This vulnerability affects Hubs Cloud < mozillareality/reticulum/1.0.1/20210618012634.