example

joined 2 years ago
[–] example@reddthat.com 2 points 2 months ago (1 children)

that's like calling strong randomly generated passwords 1.5FA.

with proper MFA, even if you steal my password (database), you won't be able to steal my account, as you're missing the second factor. with classic otp this is just a single use number you enter on the potentially compromised system, but if you get the seed (secret) stolen, valid numbers can be generated continuously.

password managers (should) protect against reuse. MFA protects against logins on untrusted and potentially compromised systems/keyloggers if they're not extracted live. password managers with auto fill and phishing resistant MFA can prevent phising, although the password manager variant is still easily bypassed when the user isn't paying enough attention, as it's not even that uncommon for login domains to change. obviously there are also other risks on compromised devices, like session cookie exfiltration, and there is a lot of bullshit info around from websites, especially the ones harvesting phone numbers while claiming to require it for 2FA just to gaslight users.

[–] example@reddthat.com 6 points 2 months ago

FreeOTP/FreeOTP+

depending on your goal for this (real 2fa vs just simulated) you shouldn't have sync in the first place.

you could also look into security keys (hardware solution, webauthn/FIDO2) as an alternative that has strong security with good user experience (no typing anymore), but they're not as widely accepted.

[–] example@reddthat.com 15 points 6 months ago

because printers are evil

[–] example@reddthat.com 5 points 8 months ago

the second link is just incorrectly linked in the comment, as the colon is included in it. it should be https://www.auswaertiges-amt.de/de/reiseundsicherheit/suedsudansicherheit-244250