SandbagTiara2816@lemmy.dbzer0.com to Technology@lemmy.worldEnglish · 5 months agoAuthy got hacked, and 33 million user phone numbers were stolenappleinsider.comexternal-linkmessage-square178fedilinkarrow-up1741arrow-down16cross-posted to: privacy@lemmy.world
arrow-up1735arrow-down1external-linkAuthy got hacked, and 33 million user phone numbers were stolenappleinsider.comSandbagTiara2816@lemmy.dbzer0.com to Technology@lemmy.worldEnglish · 5 months agomessage-square178fedilinkcross-posted to: privacy@lemmy.world
minus-squareContravariant@lemmy.worldlinkfedilinkEnglisharrow-up11·5 months agoUse TOTP wherever possible. It’s standardized, and typically can be found somewhere if you keep digging hard enough. Plenty of services push their own proprietary systems hard though. Looking at you M$
minus-squareTryptaminev@lemm.eelinkfedilinkEnglisharrow-up3·5 months agoI also find this infuriating. I had a service offer TOTP for authentication. Installed an open source TOTP Aap, scanned the QR and voila. The service meanwhile can control whether they want to generate a new token or give out the old one again, for instance when a device was lost. It is the most easy, most convenient solution both for the service provider and the client. There is no excuse for any other 2FA system to be used.
Use TOTP wherever possible. It’s standardized, and typically can be found somewhere if you keep digging hard enough.
Plenty of services push their own proprietary systems hard though. Looking at you M$
I also find this infuriating. I had a service offer TOTP for authentication. Installed an open source TOTP Aap, scanned the QR and voila.
The service meanwhile can control whether they want to generate a new token or give out the old one again, for instance when a device was lost.
It is the most easy, most convenient solution both for the service provider and the client. There is no excuse for any other 2FA system to be used.