Nevertheless I chose my Yubikey instead.

voxel
link
fedilink
English
4
edit-2
1Y

2fas

Kilgore Trout
link
fedilink
English
181Y

BVG is acronym for Berliner Verkehrsbetriebe, Berlin’s public transport agency.

hswolf
link
fedilink
English
201Y

If you get Bitwarden pro (really cheap), you can save an OTP link together with the site credentials, it’s really good for keeping everything in one place

Proton pass can also do this

If you get Vaultwarden, absolutely free, you don’t have to pay and have full control over your data. It’s a win-win!

I do this. I want to point out it is absolutely TERRIBLE for security. It’s turning 2 factor back into 1 factor authentication.

hswolf
link
fedilink
English
21Y

yeah, while I understand that, it’s not every time I have both my phone and computer together at the same time

using a standalone OTP on either one of them would make the opposite a pain in the ass to use

I take a lot of precautions with my main vault password, even got a biometric reader so I don’t have to type the password that much

You’re absolutely right. It’s all about your threat model, how much convenience you’re willing to lose and what not.
I absolutely should do more to minimize potential risk, but it’s really so convenient to just… Have it all in 1 place…

Norah - She/They
link
fedilink
English
21Y

Something that I do to make sure I’m more protected is that I don’t put the two-factor for my main email accounts into Bitwarden.

This is a smart solution. Only solution I have so far is self hosting bitwarden, using unique password to login, and having 2fa to login to bitwarden, where the key is in bitwarden, and on aegis on a phone at home.

@kniescherz@feddit.de
link
fedilink
English
141Y

I would argue its more like a 1.5 factor. Not secure when your bitwarden gets compromised. But more security for stolen, leaked, phised passwords.

I currently have 60 OTPs in Bitwarden, I probably would not have activated 2FA on so many sites without BW.

@goodhunter@lemm.ee
link
fedilink
English
91Y

Consider your threat model. You could use a yubikey for Bitwarden log in.

@IdleSheep@lemmy.blahaj.zone
link
fedilink
English
23
edit-2
1Y

This isn’t really a good idea because then you’re putting all your eggs in one basket. The whole point of 2FA is that the second factor is in a separate location so if your first factor (password) gets compromised the second one (OTP code) still protects your account. If both factors are in one place you’re back to a single point of failure instead of 2, losing a key benefit of 2FA.

If you’re gonna do this, at the very least have 2FA with a security key on your bitwarden vault.

@kniescherz@feddit.de
link
fedilink
English
41Y

You lose security, sure. But you are gaining so much more ease of use. Bitwarden autofills your credentials and puts your token into your clipboard. Also it syncs your tokens to all devices. Effectifly this makes a site as easy to login as a site without 2fa.

The alternative is on desktop always get your smartphone, open some app type a token or on the phone to switch to multiple apps to get your credentials. Not fun imho.

I currently activated 2fa on over 60 sites, I doubt I would use it as much without BW.

For me, the key benefit of 2Fa is getting more security against leaked, stolen, phished passwords, and that still holds up.

@IdleSheep@lemmy.blahaj.zone
link
fedilink
English
2
edit-2
1Y

The alternative is on desktop always get your smartphone, open some app type a token or on the phone to switch to multiple apps to get your credentials. Not fun imho.

There are desktop apps for OTP, you don’t need a phone. And since you only need to setup an OTP secret once, doing it for your phone and pc isn’t that big of a deal.

I have my OTP secrets in 3 places, 2 yubikeys and my phone’s authenticator app, with the former meant for my PC.

For me, the key benefit of 2Fa is getting more security against leaked, stolen, phished passwords, and that still holds up.

If your vault doesn’t have 2FA too this doesn’t hold up though. Means you’re trusting a single service that can get hacked with all your secrets. Sure, your other accounts are more protected against leaks and stuff, but if your password vault isn’t, you didn’t really change much, just pointed the hackers to one single place.

Yes I know hacking a password vault isn’t some walk in the park and rarely happens, but the point is any leaks from it would be 10 times more catastrophic for you if all your OTP secrets are also stored in it. I’ll spare myself from that nightmare with the small inconvenience that is a separate, offline OTP app.

@kniescherz@feddit.de
link
fedilink
English
11Y

Good points!

I got the vault protected via yubikey of course ;)

@Undertaker@feddit.de
link
fedilink
English
51Y

FreeOTP+ is the choice not Free OTP…

@floridaman@lemmy.blahaj.zone
link
fedilink
English
13
edit-2
1Y

I self host Bitwarden (Vaultwarden) so I just use the built-in TOTP authenticator in the Bitwarden app. It’s nice to have it all in one place + having auto copy and paste when I log in. And because I self host, it’s all backed up securely and with (as far as I know) no real backdoors.

ETA: just realized what community this is in. people that replied to me I’m sorry lmao, I’m not a nut about this kinda stuff and I’m by no means recommending this just like using it this way for convenience factor and to keep the likes of google out of my password.

HeywireAnt
link
fedilink
English
41Y

I do the same thing. And Bitwarden’s 2FA is off my phone. In a complicated world, it’s reasonable to keep 1 password + 2FA as secure as possible. I simply can’t handle the hassle of pulling out my phone for every 2FA login, but still value the protection 2FA + randomly generated passwords provide.

No, please do not do this. Two factor authentication should be just that: two separate factors of authenticating yourself. Having them combined in one is the same as one factor.

Said in the reply to the other comment here, but I don’t really self host for security/privacy sake. And in addition to that comment I’d also like to say that I do use a YubiKey when possible for MFA. I’m not a security nut enough to care about TOTP (which kinda sucks anyway) all too much but for important things I do use physical MFA.

jard
link
fedilink
English
3
edit-2
1Y

U2F on Bitwarden, in principle, doesn’t guard against attackers breaching into your accounts, as the Yubikey serves as a second factor during the authentication stage when the Bitwarden app retrieves the encrypted vault. Unless you combine a static secret from the Yubikey into the master password of the vault, an attacker could, in theory, steal your encrypted vault from the central Bit/Vaultwarden server or any device that’s already downloaded it (note that if this device is your phone, all conventional TOTP is thwarted anyways, so in general phones are the most lucrative target here.) From there, the strength of your master password becomes the only thing separating an attacker from access to all of your online accounts.

I’m not saying that it’s a bad practice and you absolutely shouldn’t do it — I do it myself, as I trust the security of Bitwarden’s servers and my devices in keeping my vault safe. The salient point here is the burden lies on online services upgrading their outdated security options to support U2F, not on us settling with an objectively inferior 2FA option because these services are too lazy and slow.

@Dislodge3233@feddit.de
link
fedilink
English
31Y

I have a really long password on Bitwarden like 30+. I use OnlyKey to store this password on a hardware device.

You mentioned phones. My problem with using another 2FA app is that it’s still on my phone.

@Undertaker@feddit.de
link
fedilink
English
5
edit-2
1Y

Yeah it compromises the idea of a second factor. Bitwarden is the worst choice. It’s only one thing: comfortable

Fair, although I’ve said in a comment on this account somewhere else, I self host more for convenience sake than anything. I just like having my own password manager, sure it’s not as secure to use it for MFA but it’s better than giving my passwords to Google, LastPass, etc. and then using eg Google Authenticator. Self hosting is more a corporate distrust thing than a privacy thing for me

m_r_butts
link
fedilink
31Y

Is there something wrong with 2FAS?

badgrandpa69
link
fedilink
English
21Y

i think they got some google trackers in their code

@Truck_kun@beehaw.org
link
fedilink
English
1
edit-2
1Y

I’d love to know as well.

Been using it for a while as the 2FA app used and recommended by Leo Laporte. I’ve had a good experience with it, but if it has any issues, I would love to know.

Edit: A while being a year or two.

@LWD@lemm.ee
link
fedilink
English
11Y

From what I can tell, 2FAS basically comes with the reasons people want Authy, with only some of the downsides. Cloud sync between devices is neat, but it adds a potential vector for attack (which is just inherent to the process).

@BeatTakeshi@lemmy.world
link
fedilink
English
11
edit-2
1Y

I went for another foss one a while ago, works flawlessly https://authenticatorpro.jmh.me/

That’s the one i use too, really a nice app

@noodlejetski@lemm.ee
link
fedilink
English
601Y

that’s a refreshing change from the regular Google Authenticator and Authy mentions.

What’s wrong with Authy?

@vaselined@lemmy.world
link
fedilink
English
31Y

Apparently it is hard to export out of authy

@lud@lemm.ee
link
fedilink
English
1
edit-2
1Y

Here is their justification:

In order to maintain security for our users, the Authy application does not allow importing or exporting 2FA account tokens.

Users who want to import or export their tokens can follow this process:

  1. Login to the desired online account with your existing 2FA token.
  1. Disable 2FA in the app’s site.
  2. Re-enable 2FA again in the app’s site.
  3. Scan the QR code, optionally write the Authentication Key, this time on the desired 2FA App.

https://support.authy.com/hc/en-us/articles/1260805179070-Export-or-Import-Tokens-in-the-Authy-app

Microsoft authenticator has joined the chat

Good to know, thank you.

Since it’s nice and easy to move to any device, I hadn’t really noticed that yet. I dislike when people put sneaky walls up to keep me from my own data

@Evotech@lemmy.world
link
fedilink
English
51Y

Nothing

@TheInsane42@lemmy.world
link
fedilink
English
5
edit-2
1Y

According to Wikipedia it’s based on google authenticator. Is it known how much google code is still in there?

@LWD@lemm.ee
link
fedilink
English
71Y

FreeOTP is what you’re talking about, right? It’s “Maintained by RedHat, and based on Google Authenticator.” So it’s under the control of a major open source group. I wouldn’t be worried. It’s not like or Firefox, where fork developers have to play catch-up.

badgrandpa69
link
fedilink
English
11Y

only what I don’t like in FreeOTP is lack of passcode or biometrics

I use FreeOTP+ and it requires biometrics to open

@QuazarOmega@lemy.lol
link
fedilink
English
25
edit-2
1Y

Incredibly based.
Come to think of it, it’s sad how we’ve got so accustomed to be suggested Google Authenticator and the other big corp data funnel 2FA apps by the services that support it

Aniki 🌱🌿
link
fedilink
English
131Y

andOTP is opensource, backs up locally, remotely, encrypted, or unencrypted. has no back doors, and will work with any DFA i can chuck at it.

its an archived project but still works fine in modern android

https://github.com/andOTP/andOTP

voxel
link
fedilink
English
11Y

why not 2fas

@frogmint@beehaw.org
link
fedilink
English
11Y

Why not Aegis?

@OfficerBribe@lemm.ee
link
fedilink
English
31Y

Are there well known TOTP apps with backdoors?

That depends. More of the popular ones don’t encrypt the secret keys, they can just be read out with root access or even with the use of ADB (the pull command), not even speaking about reading the memory contents while booted to a recovery.
Some even uploads the keys to a cloud service for convenience, and they consider it a feature.

@OfficerBribe@lemm.ee
link
fedilink
English
11Y

Sounds more like a bad design than purposefully left backdoors. Very few devices are rooted and usually you cannot get root without fully wiping your device in process. As for cloud upload, that indeed is convenient for most regular users. I prefer encrypted offline backup like Aegis does, but you need to think about regular folk if they would loose or wipe their device.

It’s not bad design, it’s definitely intentional, however I agree that it’s probably not for having backdoors, but for convenience. Average people forget their passwords all the time, and with encryption that level of carelessness is fatal to your data if they have not saved it somewhere, which they probably didn’t do.

Very few devices are rooted and usually you cannot get root without fully wiping your device in process.

I’m pretty sure the system is not flawless. Probably it’s harder to find an exploit in the OS than it was years ago, but I would be surprised if it would be really rare. Also, I think a considerable amount of people use the cheapest phones of no name brands (even if not in your country), or even just tablets that haven’t received updates for years and are slow but “good for use at home”. I have one at home that I rarely use. Bootloader cannot be unlocked, but there’s a couple of exploits available for one off commands and such.

Aniki 🌱🌿
link
fedilink
English
2
edit-2
1Y

Anything closed source could have backdoors. Trust no one.

Why does MS Authenticator need GPS permissions?

https://play.google.com/store/apps/datasafety?id=com.azure.authenticator

@OfficerBribe@lemm.ee
link
fedilink
English
21Y

As per their FAQ:

Permission to access your location

Q: I got a prompt asking me to grant permission for the app to access my location. Why am I seeing this?

A: You will see a prompt from the Authenticator app asking for access to your location if your IT admin has created a policy requiring you to share your GPS location before you are allowed to access specific resources. You’ll need to share your location once every hour to ensure you are still within a country where you are allowed to access the resource.

Aniki 🌱🌿
link
fedilink
English
2
edit-2
1Y

And? I don’t give a shit what the admins of my network want. It’s DFA – they don’t deserve to know that. Ergo, I don’t use the MS app. They can kiss my ass and fire me if they don’t trust where I am.

@OfficerBribe@lemm.ee
link
fedilink
English
11Y

It’s a security / compliance policy. There is a very high chance your company has not even enabled it, have not seen anyone using it.

As I see it, you would and could use it only if you force MS Authenticator notification as the only MFA method and it is important in which country MFA prompt originates. Usually it is IP based block / whitelist which checks IP from which login originates which seems like a much more useful info, then you can also allow any MFA method.

You can always deny permissions to apps.

Aniki 🌱🌿
link
fedilink
English
11Y

You’re not convincing me.

It’s rather sick to an app that’s open source

@OfficerBribe@lemm.ee
link
fedilink
English
11Y

Your question was why GPS permission is needed, you should now know why.

I am using MS Authenticator and Aegis. Using MS authenticator only for work accounts that have been setup for number matching feature, it is pretty nice to simply enter 2 digits in app than entering 6 digits in client itself any time you need to approve MFA.

Everything else that supports standard TOTP whether work related or personal is on Aegis - it is a much better TOTP app.

@XioR112@lemmy.world
link
fedilink
English
8
edit-2
1Y

This is what I use. Also supports exporting/importing data to and from Gnome Authenticator so you have 2FA on your computer too 👍

Aniki 🌱🌿
link
fedilink
English
21Y

Sick! I didn’t think to look at the forks but that’s amazing.

@LWD@lemm.ee
link
fedilink
English
151Y

I think I’d rather use a solution under active development, thanks for the rec though

BolexForSoup
link
fedilink
41Y

This is becoming a trend and I really don’t like it.

@Y2K38@lemmy.one
creator
link
fedilink
English
101Y

What exactly?

BolexForSoup
link
fedilink
12
edit-2
1Y

Setting restrictions on what 2FA/authenticators we can use. I imagine it’s only a matter of time before Google functionally makes it so you can only use theirs when using their services.

Edit: I assumed it was some of the messages I’ve seen elsewhere, my mistake. I don’t need everybody repeating the same comment. Please read the responses before telling me the exact same thing over and over again guys lol

@starlord@lemm.ee
link
fedilink
English
21Y

I’ve gone tons of places that say use Google Authenticator (only) and I just summon the QR code and scan with Aegis anyway and it always works fine. I’ve never seen a place that required a certain one.

Instantnudeln
link
fedilink
English
181Y

They recommend these two. Under the recommendations it even says you can also use different apps…

@Y2K38@lemmy.one
creator
link
fedilink
English
201Y

At least for what I just posted this isn’t a restriction. Its a recommendation. You can still use any other app. I thought its nice that they recommend the privacy friendly ones.

It literally says “Other authenticator apps that support OTP […] can also be used”.

In India, they force us to install proprietary apps, which are probably spying on us.

Star
link
fedilink
English
21Y

They don’t, though? Who’s forcing you to install a proprietary 2FA app in India. Unless you’re saying in general.

My bank, for example, does not let us use any 2FA app we want. They have their own separate app, made for handling 2FA for that specific bank only.

And in general too, yes. Like Arogya Setu. The app we had to install to prove our vaccination status.

Instantnudeln
link
fedilink
English
321Y

EhrenBVG. Wie immer.

Create a post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • 1 user online
  • 1 user / day
  • 4 users / week
  • 45 users / month
  • 395 users / 6 months
  • 1 subscriber
  • 675 Posts
  • 11.2K Comments
  • Modlog