@[email protected] to [email protected]English • 4 months agoAuthy got hacked, and 33 million user phone numbers were stolenappleinsider.comexternal-linkmessage-square186fedilinkarrow-up1738arrow-down16cross-posted to: [email protected]selfhostedtechnology
arrow-up1732arrow-down1external-linkAuthy got hacked, and 33 million user phone numbers were stolenappleinsider.com@[email protected] to [email protected]English • 4 months agomessage-square186fedilinkcross-posted to: [email protected]selfhostedtechnology
minus-square@[email protected]linkfedilinkEnglish11•4 months agoUse TOTP wherever possible. It’s standardized, and typically can be found somewhere if you keep digging hard enough. Plenty of services push their own proprietary systems hard though. Looking at you M$
minus-square@[email protected]linkfedilinkEnglish3•4 months agoI also find this infuriating. I had a service offer TOTP for authentication. Installed an open source TOTP Aap, scanned the QR and voila. The service meanwhile can control whether they want to generate a new token or give out the old one again, for instance when a device was lost. It is the most easy, most convenient solution both for the service provider and the client. There is no excuse for any other 2FA system to be used.
Use TOTP wherever possible. It’s standardized, and typically can be found somewhere if you keep digging hard enough.
Plenty of services push their own proprietary systems hard though. Looking at you M$
I also find this infuriating. I had a service offer TOTP for authentication. Installed an open source TOTP Aap, scanned the QR and voila.
The service meanwhile can control whether they want to generate a new token or give out the old one again, for instance when a device was lost.
It is the most easy, most convenient solution both for the service provider and the client. There is no excuse for any other 2FA system to be used.