this post was submitted on 17 Jul 2023
33 points (100.0% liked)

Privacy

32023 readers
975 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

What’s your prefer two-factor authentication app for iOS?

I'm looking for an app that offers the best combination of platform compatibility (preferably available on Mac OS, iPad OS, and iOS), security, usability, and reliability.

It would be great if the app is open source and has a backup feature as well.

I came across a recent Wirecutter article from The New York Timesthat recommends Cisco DUO Mobile as the top choice, followed by Authy and Google Authenticator.

I would greatly appreciate your insights and security perspectives.

Thank you!

you are viewing a single comment's thread
view the rest of the comments
[–] remus@lemmy.world 4 points 1 year ago (2 children)

Doesn’t this defeat the purpose of multi factor authentication though? If someone got access to 1Password, they could access both your password and secondary authentication code. I think it may be a better idea to keep them separate.

[–] notjvb@lemmy.world 3 points 1 year ago* (last edited 1 year ago) (1 children)

Pretty big “if” since I’m the only one who knows the long password, I rotate it often, and I hold the keys to encrypt everything. You’re right it’s a single point of fail but a LOT would have to go wrong for it to fail.

Edit: plus 1P supports physical 2FAs to get into the vault itself, if that helps

[–] Achird@sh.itjust.works 3 points 1 year ago

1Password has a blog post that talks about it here. https://blog.1password.com/1password-2fa-passwords-codes-together/

Ultimately it depends on your threat model and security vs convenience.