Nevertheless I chose my Yubikey instead.

      • @vaselined
        link
        English
        31 year ago

        Apparently it is hard to export out of authy

        • @[email protected]
          link
          fedilink
          English
          2
          edit-2
          1 year ago

          Here is their justification:

          In order to maintain security for our users, the Authy application does not allow importing or exporting 2FA account tokens.

          Users who want to import or export their tokens can follow this process:

          1. Login to the desired online account with your existing 2FA token.
          1. Disable 2FA in the app’s site.
          2. Re-enable 2FA again in the app’s site.
          3. Scan the QR code, optionally write the Authentication Key, this time on the desired 2FA App.

          https://support.authy.com/hc/en-us/articles/1260805179070-Export-or-Import-Tokens-in-the-Authy-app

        • @totallynotarobot
          link
          English
          21 year ago

          Good to know, thank you.

          Since it’s nice and easy to move to any device, I hadn’t really noticed that yet. I dislike when people put sneaky walls up to keep me from my own data

  • @[email protected]
    link
    fedilink
    English
    231 year ago

    Incredibly based.
    Come to think of it, it’s sad how we’ve got so accustomed to be suggested Google Authenticator and the other big corp data funnel 2FA apps

    • Star
      link
      fedilink
      English
      21 year ago

      They don’t, though? Who’s forcing you to install a proprietary 2FA app in India. Unless you’re saying in general.

      • @[email protected]
        link
        fedilink
        English
        21 year ago

        My bank, for example, does not let us use any 2FA app we want. They have their own separate app, made for handling 2FA for that specific bank only.

        And in general too, yes. Like Arogya Setu. The app we had to install to prove our vaccination status.

  • hswolf
    link
    English
    181 year ago

    If you get Bitwarden pro (really cheap), you can save an OTP link together with the site credentials, it’s really good for keeping everything in one place

    • @[email protected]
      link
      fedilink
      English
      351 year ago

      I do this. I want to point out it is absolutely TERRIBLE for security. It’s turning 2 factor back into 1 factor authentication.

      • @[email protected]
        link
        fedilink
        English
        141 year ago

        I would argue its more like a 1.5 factor. Not secure when your bitwarden gets compromised. But more security for stolen, leaked, phised passwords.

        I currently have 60 OTPs in Bitwarden, I probably would not have activated 2FA on so many sites without BW.

      • hswolf
        link
        English
        11 year ago

        yeah, while I understand that, it’s not every time I have both my phone and computer together at the same time

        using a standalone OTP on either one of them would make the opposite a pain in the ass to use

        I take a lot of precautions with my main vault password, even got a biometric reader so I don’t have to type the password that much

        • @[email protected]
          link
          fedilink
          English
          21 year ago

          You’re absolutely right. It’s all about your threat model, how much convenience you’re willing to lose and what not.
          I absolutely should do more to minimize potential risk, but it’s really so convenient to just… Have it all in 1 place…

          • Norah - She/They
            link
            fedilink
            English
            21 year ago

            Something that I do to make sure I’m more protected is that I don’t put the two-factor for my main email accounts into Bitwarden.

            • @[email protected]
              link
              fedilink
              English
              21 year ago

              This is a smart solution. Only solution I have so far is self hosting bitwarden, using unique password to login, and having 2fa to login to bitwarden, where the key is in bitwarden, and on aegis on a phone at home.

    • @[email protected]
      link
      fedilink
      English
      23
      edit-2
      1 year ago

      This isn’t really a good idea because then you’re putting all your eggs in one basket. The whole point of 2FA is that the second factor is in a separate location so if your first factor (password) gets compromised the second one (OTP code) still protects your account. If both factors are in one place you’re back to a single point of failure instead of 2, losing a key benefit of 2FA.

      If you’re gonna do this, at the very least have 2FA with a security key on your bitwarden vault.

      • @[email protected]
        link
        fedilink
        English
        31 year ago

        You lose security, sure. But you are gaining so much more ease of use. Bitwarden autofills your credentials and puts your token into your clipboard. Also it syncs your tokens to all devices. Effectifly this makes a site as easy to login as a site without 2fa.

        The alternative is on desktop always get your smartphone, open some app type a token or on the phone to switch to multiple apps to get your credentials. Not fun imho.

        I currently activated 2fa on over 60 sites, I doubt I would use it as much without BW.

        For me, the key benefit of 2Fa is getting more security against leaked, stolen, phished passwords, and that still holds up.

        • @[email protected]
          link
          fedilink
          English
          3
          edit-2
          1 year ago

          The alternative is on desktop always get your smartphone, open some app type a token or on the phone to switch to multiple apps to get your credentials. Not fun imho.

          There are desktop apps for OTP, you don’t need a phone. And since you only need to setup an OTP secret once, doing it for your phone and pc isn’t that big of a deal.

          I have my OTP secrets in 3 places, 2 yubikeys and my phone’s authenticator app, with the former meant for my PC.

          For me, the key benefit of 2Fa is getting more security against leaked, stolen, phished passwords, and that still holds up.

          If your vault doesn’t have 2FA too this doesn’t hold up though. Means you’re trusting a single service that can get hacked with all your secrets. Sure, your other accounts are more protected against leaks and stuff, but if your password vault isn’t, you didn’t really change much, just pointed the hackers to one single place.

          Yes I know hacking a password vault isn’t some walk in the park and rarely happens, but the point is any leaks from it would be 10 times more catastrophic for you if all your OTP secrets are also stored in it. I’ll spare myself from that nightmare with the small inconvenience that is a separate, offline OTP app.

    • @[email protected]
      link
      fedilink
      English
      41 year ago

      If you get Vaultwarden, absolutely free, you don’t have to pay and have full control over your data. It’s a win-win!

  • Kilgore Trout
    link
    fedilink
    English
    161 year ago

    BVG is acronym for Berliner Verkehrsbetriebe, Berlin’s public transport agency.

  • Aniki 🌱🌿
    link
    fedilink
    English
    141 year ago

    andOTP is opensource, backs up locally, remotely, encrypted, or unencrypted. has no back doors, and will work with any DFA i can chuck at it.

    its an archived project but still works fine in modern android

    https://github.com/andOTP/andOTP

      • 𝒍𝒆𝒎𝒂𝒏𝒏
        link
        fedilink
        English
        21 year ago

        This is what I use. Also supports exporting/importing data to and from Gnome Authenticator so you have 2FA on your computer too 👍

        • @[email protected]
          link
          fedilink
          English
          31 year ago

          As per their FAQ:

          Permission to access your location

          Q: I got a prompt asking me to grant permission for the app to access my location. Why am I seeing this?

          A: You will see a prompt from the Authenticator app asking for access to your location if your IT admin has created a policy requiring you to share your GPS location before you are allowed to access specific resources. You’ll need to share your location once every hour to ensure you are still within a country where you are allowed to access the resource.

          • Aniki 🌱🌿
            link
            fedilink
            English
            2
            edit-2
            1 year ago

            And? I don’t give a shit what the admins of my network want. It’s DFA – they don’t deserve to know that. Ergo, I don’t use the MS app. They can kiss my ass and fire me if they don’t trust where I am.

            • @[email protected]
              link
              fedilink
              English
              21 year ago

              It’s a security / compliance policy. There is a very high chance your company has not even enabled it, have not seen anyone using it.

              As I see it, you would and could use it only if you force MS Authenticator notification as the only MFA method and it is important in which country MFA prompt originates. Usually it is IP based block / whitelist which checks IP from which login originates which seems like a much more useful info, then you can also allow any MFA method.

              You can always deny permissions to apps.

              • Aniki 🌱🌿
                link
                fedilink
                English
                11 year ago

                You’re not convincing me.

                It’s rather sick to an app that’s open source

                • @[email protected]
                  link
                  fedilink
                  English
                  21 year ago

                  Your question was why GPS permission is needed, you should now know why.

                  I am using MS Authenticator and Aegis. Using MS authenticator only for work accounts that have been setup for number matching feature, it is pretty nice to simply enter 2 digits in app than entering 6 digits in client itself any time you need to approve MFA.

                  Everything else that supports standard TOTP whether work related or personal is on Aegis - it is a much better TOTP app.

  • @[email protected]
    link
    fedilink
    English
    13
    edit-2
    1 year ago

    I self host Bitwarden (Vaultwarden) so I just use the built-in TOTP authenticator in the Bitwarden app. It’s nice to have it all in one place + having auto copy and paste when I log in. And because I self host, it’s all backed up securely and with (as far as I know) no real backdoors.

    ETA: just realized what community this is in. people that replied to me I’m sorry lmao, I’m not a nut about this kinda stuff and I’m by no means recommending this just like using it this way for convenience factor and to keep the likes of google out of my password.

    • @Winter8593
      link
      English
      131 year ago

      No, please do not do this. Two factor authentication should be just that: two separate factors of authenticating yourself. Having them combined in one is the same as one factor.

      • @[email protected]
        link
        fedilink
        English
        41 year ago

        Said in the reply to the other comment here, but I don’t really self host for security/privacy sake. And in addition to that comment I’d also like to say that I do use a YubiKey when possible for MFA. I’m not a security nut enough to care about TOTP (which kinda sucks anyway) all too much but for important things I do use physical MFA.

          • @[email protected]
            link
            fedilink
            English
            31 year ago

            I have a really long password on Bitwarden like 30+. I use OnlyKey to store this password on a hardware device.

            You mentioned phones. My problem with using another 2FA app is that it’s still on my phone.

    • @[email protected]
      link
      fedilink
      English
      5
      edit-2
      1 year ago

      Yeah it compromises the idea of a second factor. Bitwarden is the worst choice. It’s only one thing: comfortable

      • @[email protected]
        link
        fedilink
        English
        31 year ago

        Fair, although I’ve said in a comment on this account somewhere else, I self host more for convenience sake than anything. I just like having my own password manager, sure it’s not as secure to use it for MFA but it’s better than giving my passwords to Google, LastPass, etc. and then using eg Google Authenticator. Self hosting is more a corporate distrust thing than a privacy thing for me

    • HeywireAnt
      link
      fedilink
      English
      41 year ago

      I do the same thing. And Bitwarden’s 2FA is off my phone. In a complicated world, it’s reasonable to keep 1 password + 2FA as secure as possible. I simply can’t handle the hassle of pulling out my phone for every 2FA login, but still value the protection 2FA + randomly generated passwords provide.

    • @CodeGameEat
      link
      English
      31 year ago

      That’s the one i use too, really a nice app

  • @TheInsane42
    link
    English
    5
    edit-2
    1 year ago

    According to Wikipedia it’s based on google authenticator. Is it known how much google code is still in there?

    • badgrandpa69
      link
      English
      31 year ago

      i think they got some google trackers in their code