-
Notifications
You must be signed in to change notification settings - Fork 504
Description
Many people use SMS for two-factor authentication, which means that forwarding SMSes with "security codes" into email considerably weakens overall security.
- If a GMail session can be intercepted (eg by leaving an unattended GMail session on a public computer), the attacker can receive the 2FA codes and thereby gain access to change settings on the account; in effect, taking ownership of it.
- A compromised GMail account could be leveraged to gain access to other services that are normally protected by 2-factor authentication.
I suggest checking the content of each message against a list of (regex?) patterns, and if any matches, then the message won't by copied into GMail.
There should be a default list provided with the app that includes:
/your .*(authentication|security|bank) (code|password|token)/i
which in particular must match
Your GMail security code is 123456
I'm open to whether users should be able to edit the list, but if they attempt to save an empty list, or otherwise disable this function, they should be subjected to a "why this is a bad idea" explanation. And they should have the option to "add default patterns".
If anyone knows an appropriate pattern for the 2FA SMS of any common Social Media, Financial, or Government service, please add details in a comment, either as a regex, or as an example of an actual SMS.
(added)
It should also be possible to suppress backing up messages based on the sender's phone number.
(added 2)
To avoid needing a UI to manage a blacklist, simply have a custom contacts label that prevents backing up messages from the numbers of those contacts.