frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Border search safe TOTP authenticator app?

10•jakedata•8h ago
While crossing international borders, a traveler may be legitimately asked to provide access to their devices. Such a person is often not in a position to refuse.

I am searching for a dual-pin TOTP app that looks like it is working whether it is or not. Entering the wrong PIN might cause the app to generate invalid codes while optionally wiping the real config.

Actually attempting to use the invalid code could potentially trigger all kinds of actions on the server that received the bogus login request. Sending an SOS email might be one such action.

I am not sure such a thing exists in either major app store. Thoughts?

Comments

xxpor•7h ago
Be very careful with your threat model here. If an agent attempts to use the codes and they don't work, and they find out there's a dual pin mechanism, you could end up in more trouble than with whatever they'd have seen in the first place.
mrsilencedogood•7h ago
Yeah, people love to LARP being Snowden but never actually have anything even theoretically worth being sent to border-jail over protecting.

And, if you do, and you're really asking hacker news for opsec advice, I would suggest you abandon your career as a super-spy or whatever you're doing, because you're doing it very wrong.

jakedata•7h ago
Not a superspy. Oblig: https://xkcd.com/705
ectospheno•7h ago
Have a phone just for travel. Different account. Only have things you actually need during travel on it. Turn on a cheap plan when you need it. If they ask for something just say you can't remember and let them keep it.
soraminazuki•4h ago
This is the nothing to hide argument dressed up with hyperbole, straw men, and insults. You're making fun of people protecting basic human rights.
altairprime•7h ago
Memorize one TOTP key for a cloud offering; then store the rest in it. 1password, Lastpass, etc. It’s not that much longer than a Windows product key, and I still know one of those.

The secret key is just an RNG output so you could also take it in 4 byte chunks and memorize 16 PRNG inputs that generate each the 4 bytes.

Or you could memorize a passphrase, take a sha2 hash of it, and then memorize a single PRNG input that spits out the bitstring diff between the hash output and the TOTP key. That way you aren’t wholly dependent on memorizing numbers and you can still safely use a more predictable and weak ‘PRNG’ that can amplify the bitstring salt out of an input.

etc.

jasonpeacock•7h ago
FYI, you're asking about duress codes[1] - it may help your search to use that term.

[1] https://en.wikipedia.org/wiki/Duress_code

esbranson•6h ago
Lying to US officials is 5 years in prison. Per instance. One assumes other countries have similar laws, but I doubt anyone knows what actually happens in courts outside the US.
slau•6h ago
Just store the TOTPs you actually care about on a Yubikey. Leave a few “worthless” TOTP in whatever TOTP app you use. Remove the Yubico Authenticator app before crossing the border.
Elfener•6h ago
This post came to mind: https://blog.singleton.io/posts/2022-10-17-otp-on-wrist/

I doubt anyone wants to search a f-91w.

Nextgrid•6h ago
You need to re-evaluate your threat model and change your approach. As others have said here, a TOTP that doesn't work would attract more attention that one that does or one that outright doesn't exist, all the way up to escalating the encounter from casual privacy-conscious user to alleged spy.

The best way is to legitimately not have anything on the phone or your online presence that would cause problems, and then just be transparent (honestly, they're not after your nudes or embarrassing texts). A lot of border checks are based on feelings and if you look the part they'll quickly flick through the phone for obvious stuff they're after and will let you go once they don't find it.

If you are actually doing something that would cause issues, then you keep this off the local device and onto a remote one. Use a YubiKey or other dual-use authenticator (that gives you plausible deniability for having it - you can use the same key on benign social media accounts, etc) to access it from a secure device once you're through.

wkat4242•4h ago
Also, the obvious: don't visit countries with border device searches.

I can understand customs looking for suspicious contraband. We all want drugs confiscated. But data is easier to transport across borders online than on a person's device. If they're looking for hints of terrorism these can be done also after entering the country with the proper warrants.

The only reason these are done is just theater and muscle flexing/bullying. They don't serve a real purpose. And the countries carrying these out are just trying to look tough.

ahazred8ta•10m ago
Note: there are more comprehensive border-crossing security guides

https://freedom.press/digisec/guides/

The Fed says this is a cube of $1M. They're off by half a million

https://calvin.sh/blog/fed-lie/
963•c249709•10h ago•382 comments

Hilbert's sixth problem: derivation of fluid equations via Boltzmann's theory

https://arxiv.org/abs/2503.01800
33•nsoonhui•2h ago•20 comments

Figma Files Registration Statement for Proposed Initial Public Offering

https://www.figma.com/blog/s1-public/
223•kualto•7h ago•96 comments

Fakespot shuts down today after 9 years of detecting fake product reviews

https://blog.truestar.pro/fakespot-shuts-down/
120•doppio19•6h ago•55 comments

Why Do Swallows Fly to the Korean DMZ?

https://www.sapiens.org/culture/korean-dmz-estuary-politics-war-borders-diaspora/
18•gaws•3d ago•0 comments

Code⇄GUI bidirectional editing via LSP

https://jamesbvaughan.com/bidirectional-editing/
148•jamesbvaughan•10h ago•33 comments

The Roman Roads Research Association

https://www.romanroads.org/
43•bjourne•6h ago•3 comments

Feasibility study of a mission to Sedna - Nuclear propulsion and solar sailing

https://arxiv.org/abs/2506.17732
173•speckx•12h ago•63 comments

Ask HN: Who is hiring? (July 2025)

192•whoishiring•12h ago•226 comments

Show HN: Spegel, a Terminal Browser That Uses LLMs to Rewrite Webpages

https://simedw.com/2025/06/23/introducing-spegel/
314•simedw•14h ago•143 comments

Soldier's wrist purse discovered at Roman legionary camp

https://www.heritagedaily.com/2025/06/soldiers-wrist-purse-discovered-at-roman-legionary-camp/155513
27•bookofjoe•3d ago•0 comments

Show HN: I made a 2D game engine in Dart

https://bullseye2d.org/
16•joemanaco•3d ago•3 comments

I built something that changed my friend group's social fabric

https://blog.danpetrolito.xyz/i-built-something-that-changed-my-friend-gro-social-fabric/
532•dandano•3d ago•232 comments

Effectiveness of trees in reducing temperature, outdoor heat exposure in Vegas

https://iopscience.iop.org/article/10.1088/2752-5295/ade17d
85•PaulHoule•6h ago•78 comments

Building a Personal AI Factory

https://www.john-rush.com/posts/ai-20250701.html
101•derek•5h ago•50 comments

Australians to face age checks from search engines

https://ia.acs.org.au/article/2025/australians-to-face-age-checks-from-search-engines.html
46•stubish•3h ago•68 comments

Ask HN: Who wants to be hired? (July 2025)

77•whoishiring•12h ago•176 comments

Show HN: Core – open source memory graph for LLMs – shareable, user owned

https://github.com/RedPlanetHQ/core
65•Manik_agg•10h ago•25 comments

OpenFLOW – Quickly make beautiful infrastructure diagrams local to your machine

https://github.com/stan-smith/OpenFLOW
280•x0z•20h ago•64 comments

The Hoyle State (2021)

https://johncarlosbaez.wordpress.com/2021/02/04/the-hoyle-state/
44•gone35•8h ago•8 comments

Experience converting a mathematical software package to C++20 modules [PDF]

https://arxiv.org/abs/2506.21654
99•vblanco•13h ago•22 comments

Show HN: Jobs by Referral: Find jobs in your LinkedIn network

https://jobsbyreferral.com/
115•nicksergeant•14h ago•53 comments

Cua (YC X25) is hiring an engineer

https://www.ycombinator.com/companies/cua/jobs/dIskIB1-founding-engineer-cua-yc-x25
1•GreenGames•10h ago

Graph Theory Applications in Video Games

https://utk.claranguyen.me/talks.php?id=videogames
63•haywirez•3d ago•4 comments

Swearing as a Response to Pain: Assessing Effects of Novel Swear Words

https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2020.00723/full
39•sega_sai•2d ago•44 comments

The wanton destruction of a creative-tech era

https://blog.greg.technology/2025/06/30/fastly.html
71•gregsadetsky•8h ago•10 comments

All Good Editors Are Pirates: In Memory of Lewis H. Lapham

https://www.laphamsquarterly.org/roundtable/all-good-editors-are-pirates
64•Caiero•2d ago•11 comments

America's Hot Garbage Problem

https://www.bloomberg.com/graphics/2025-america-hot-garbage-problem-toxic-landfills
51•petethomas•3h ago•18 comments

Show HN: HackerNewt – Breadth-first exploring HN client for iOS

https://apps.apple.com/us/app/hackernewt-for-hacker-news/id6448201970
41•hnand•11h ago•23 comments

Using Sun Ray thin clients in 2025

https://catstret.ch/202506/sun-ray-shenanigans/
86•todsacerdoti•3h ago•27 comments