Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2FA #1

Closed
ghost opened this issue Dec 25, 2021 · 2 comments
Closed

2FA #1

ghost opened this issue Dec 25, 2021 · 2 comments

Comments

@ghost
Copy link

ghost commented Dec 25, 2021

To use either Authy or Authenticator for TOTP is less secure, I will argue, than to use Password Store and/or Aegis.

Password Store uses gpg-encrypted plain text files to manage passwords and syncs with any git provider.

Password Store (Manage your passwords) - https://f-droid.org/packages/dev.msfjarvis.aps

Aegis Authenticator is open source (licensed under GPL v3) and the source code can be found here: http://github.com/beemdevelopment/Aegis

The issue with Authy is that it depends on a phone number which can be changed through an email request, allowing anyone access to HOTP/TOTP after an approximate 4-day wait period.

@OffcierCia
Copy link
Owner

Great tip!

OffcierCia added a commit that referenced this issue Dec 21, 2022
Updated - issues #1 #2
@OffcierCia
Copy link
Owner

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant