Can you confirm that the server will NOT send the encrypted blob until 2FA is successful (assuming it is on of course)??
Also for clarity can you state how 2 level encryption could have possibly helped this scenario?
Correct this is the primary purpose of blockchain 2FA. Which Scenario? It prevents someone being bale to attempt to bruteforce the wallet if they know the alias or guid.
Thanks piuk. How do you think thieves are getting wallet URLs? My friend never logged on since it was setup 6 months ago, and didn't use an alias (and has never heard of bitcointalk...). Yet she had 7 coins stolen last week. Lots of similar reports going round.
Could be many things. Is her PC clean? Is her email secure? She might have visited a phishing sites (some based on domain misspellings). Does she reuse the password on other sites?
Did she purchase and import the private key from somewhere? some sites encourage you to import a private key containing purchased coins.
What it doesn't really emphasise is that wallet nickname == wallet identifier so if you've used e.g. a public wallet nickname (bitcointalk forum name) and haven't enabled 2FA then this does lower the bar for an attacker to perform an offline bruteforce.
I think a good way to counter this would be for blockchain to recognise the browser the normally logs into the wallet and challenge unknown browsers by confirming an email or SMS code. This would place less emphasis on the need to keep the alias or guid secure.