Closed bionicbone closed 8 months ago
More great ideas derived from YouTube comments [@thebagmasters] [@bennymegidish]
The next bullet point has been implimented
The next bullet point has been implimented
All these YouTube emhancements have been completed
YouTube Video and Comments for reference. https://youtu.be/TpmY-2w8CTI
Credits to: [@deterdamel7380] [@AllanSavolainen] [@jamesharding7536] [@bsmerchants] [@ajinkyakamat7053] Sorry if I missed anyone :)
The next bullet point has been implimented
After research, this next bullet point is not required for this project. The reason for encryption & hash in verious methodologies are to hide the original data due to the risk of reverse engineering the algorithm that created the next value. However, given my list of codes were not created by an algorithm there is no such reverse angineering possible, therefore presenting the raw data adds no risk. End users are encouraged to create their own unique list of numbers, either using the inbuilt method or some other method like hex editor value of a file, each user has a unique system, the length of the loop, the size of the code, the init-value to be added after the full loop of numbers has been consumed etc.
After research this next bullet point probably is a threat, I intend to build a RollJam device so I can play and learn how to detect it so I can close the system down - Watch this space, created issue #15 to track progress on this!!
After research RollBack is not a threat to my methodoligy
As per HOTP