It’s time for me to move from SMS to a 2FA Authenticator app. I want something that will be open source but also ridiculously easy to back up, transfer to a new device, or replace if it is on a device that fails. I want it to be versatile enough to use across all necessary authentications. I also want to be sure that I can use the same app for many many years. I don’t want it tied into another service.

What’s my best option?

  • Rob T Firefly
    link
    English
    422 hours ago

    The one pro to Google Authenticator is that its icon looks like a little clenched sphincter, so when prompted for a 2FA code I can say some variation of “well, time to pull a code from the asshole…”

  • @[email protected]
    link
    fedilink
    120 hours ago

    I enjoy proton pass. It automatically fills in OTP codes with one click and syncs across devices. I also pay for the unlimited email aliases it does and am very happy with that service.

    I use a separate OTP with a different app to log into proton pass. Eventually I should make this a yubikey or something.

  • @Feathercrown
    link
    English
    41 day ago

    App: None

    Pros: No 2FA

    Cons: No 2FA

    I am but a simple man

  • Admiral Patrick
    link
    fedilink
    English
    252 days ago

    I’m pretty happy with Aegis. AFAIK, it doesn’t work with any of the “push” style methods (Duo, MS Auth, etc), but I don’t care for those anyway. Easy to backup/restore, the backups are encrypted, you can lock the app behind a password/PIN and/or biometric lock, and it’s open source.

  • @[email protected]
    link
    fedilink
    English
    20
    edit-2
    2 days ago

    I use Aegis. Backs up to a password encrypted file.

    File follows same as all the rest backup procedures.

  • @ShittyBeatlesFCPres
    link
    English
    11
    edit-2
    2 days ago

    I use Bitwarden as a password manager and 2FA manager. I like that Bitwarden automatically copies the 2FA number after filling a password — if you want it to — so I just hit paste and it’s all quick and easy. It’s a lot of trust to put in one product/company, obviously, but I use biometric, FIDO, or ssh keys for critical stuff (at least where I have the option).

    I also use Authy, in part because I used it for years before switching to Bitwarden. I liked Authy a lot but it was just less convenient than using Bitwarden. Also, a few sites — Twilio (Authy’s parent company) ones, specifically — seem to require Authy.

    Passwordless is coming along but pretty slowly. So, definitely setup 2FA. Tech companies can’t seem to wait to switch to passwordless. Other types of businesses are super conservative about logins and probably won’t adopt it for a few more years.

    • @[email protected]
      link
      fedilink
      English
      118 hours ago

      Not sure what “Authenticator Pro” is but your link goes to “Stratum - Authenticator App” fyi

    • @ILikeRamen
      link
      115 hours ago

      +1. Works well on Android as well. You can set up your Google Drive to store an encrypted backup of your private keys using a password you set. It also supports importing from other authenticator apps

    • @[email protected]
      link
      fedilink
      English
      117 hours ago

      Interesting option. Need to figure out if backups can be done without allowing access to iCloud.

    • @thesohoriots
      link
      English
      32 days ago

      Second 2FAS, at least on iOS devices. I switched from Authy after Twilio got motherfucked the first time.

  • @[email protected]
    link
    fedilink
    11 day ago

    Make sure that it can be backed up, somehow.

    Save your recovery codes in an organized and secure fashion.

    Offhand, Ente does backup I believe.

    Bitwarden does export (save on encrypted drive, or print and put in safe deposit box)

  • @[email protected]
    link
    fedilink
    42 days ago

    Vaultwarden, and open-source upstream bitwarden client-compatible backend. Stores passwords, 2FA, and any secure texts.

  • Rentlar
    link
    fedilink
    32 days ago

    AndOTP is what I use… you can produce encrypted or unecrypted backups, and even if not ideal for sensitive/secure information, you can transfer unencrypted JSON easily to virtually any other app on PC or otherwise.

    • DacoTaco
      link
      21 day ago

      I used to use andotp, but moved to aegis when i got a new phone because andotp is no longer maintained since 2022 and it had issues on my new phone. Was a great app though!

      • Rentlar
        link
        fedilink
        31 day ago

        Yeah it is great. It is too bad that it’s not maintained anymore, but besides compatibility issues with new phones like you mention, I really have no reason to pick a new app if the one I was using for years still works.

  • @PetteriPano
    link
    22 days ago

    I use ente auth.

    It’s open source, keeps your keys encrypted in the cloud and lets you use it on all devices. Convenient to have it on my desktop and backup phone.

    Yes, it’s not best practice. I feel the risk is greatest that some password hashes leak. I want to guard myself from getting locked out.

  • @flying_gel
    link
    12 days ago

    I’m using pass, the Unix standard password manager. While the original application is just a. shell script, gpg and git, it seems to have evolved more into a standard structure of encrypted files that any applications can use.

    On UNIX I use gopass, on my phone I use Password store together with open keychain.

    Benefits: completely self hosted, well known and robust technology, easy for developers to make applications or even just read the files youself

    Cons: Need to setup and maintain gpg keys. Applications I’ve used so far seem geared to more technical people. Setting up a new device requires copying gpg keys or generating new ones and add the public key to your vault. Last I checked, no viable IOS client.

    Depending on your view this can be either pro or con, but you can store your 2fa and password in the same repo, all protected by your gpg keys.