Does anyone have a recommendation for an Open Source 2FA OTP app? That's the only thing I use Authy for, to scan the QR Codes into the App and generate the 2FA tokens, but in a way that allows me to migrate to another phone without having to re-set all the 2FA tokens on the vendor side.
SushiHippie|1 year ago
https://f-droid.org/packages/com.beemdevelopment.aegis/
Or if you have a YubiKey you could also use it for TOTPs
Windows, Linux, Android: https://github.com/Yubico/yubioath-flutter
iOs: https://github.com/Yubico/yubioath-ios
I personally use Bitwarden for TOTPs (with a self hosted vaultwarden instance), it's by far not the most secure way to store your passwords and TOTPs next to each other, but it saves so much time.
alias_neo|1 year ago
I migrated to Aegis a while back because I wasn't happy with how hard it is to get secrets out of Authy, or that someone else is managing them, and they they need my phone number (guess I was right, again).
I use Folder Sync on my Android to sync the Aegis auto-backups to a MinIO bucket I host at home.
tamimio|1 year ago
Migrating from Authy is a headache, though you don’t have to reset the tokens. I found a way to do it (1), but I had to do it manually because Authy only exported the email/user and the token. Now, if you are like how I used to be, having the same email for different accounts, the exported JSON will be confusing and there's no way to tell which account is for which service. Only in the Authy UI can you tell. I had to follow the order of the JSON and the app, one by one, for my 700+ accounts, and verify that it works by going to the service site and testing the generated code from the new app, and also changing the email to a unique one. It took a whole week!
Edit: to add, I wouldn’t recommend using Yubico or hardware-based ones unless you will have two or more replicas, losing them is easy compared to having your tokens backed up in an encrypted KeepassXC db for example.
(1) https://gist.github.com/gboudreau/94bb0c11a6209c82418d01a59d...
bobbylarrybobby|1 year ago
brightball|1 year ago
When it’s not a system I’m deeply concerned about I will just use the 2FA on the password manager.
mrb|1 year ago
prophesi|1 year ago
This one[1] seems the most up-to-date, by a German research group. You'd share the link as text to the KeePassDX app, search for the entry it's for, and it populates it with the HTOP/TOTP secret.
There are iOS Keepass clients that support this as well, though from what I can tell there's some drama with source code[2][3] in the landscape.
[0] https://f-droid.org/en/packages/com.kunzisoft.keepass.libre/
[1] https://f-droid.org/en/packages/com.secuso.privacyFriendlyCo...
[2] https://github.com/MiniKeePass/MiniKeePass/issues/606
[3] https://keepassium.com/articles/keepass-apps-for-ios/welcome...
And other allegations under the ethics & transparency sections of KeePassium's list of iOS alternatives https://keepassium.com/articles/keepass-apps-for-ios/
pnw|1 year ago
MaxMatti|1 year ago
hypeatei|1 year ago
notatworkbro|1 year ago
fragmede|1 year ago
https://dangerousthings.com/product/apex-flex/
nwhale|1 year ago
And you actually know what is going on. Works for GitHub.
https://www.nongnu.org/oath-toolkit/
izacus|1 year ago
TheBozzCL|1 year ago
etoulas|1 year ago
WanderPanda|1 year ago
pxeger1|1 year ago
mm263|1 year ago
https://www.reddit.com/r/privacy/comments/1d3zqvv/raivo_auth...
unknown|1 year ago
[deleted]