Explore >> Select a destination


You are here

rcoh.me
| | zserge.com
1.5 parsecs away

Travel
| | Many of us use one-time passwords (OTP) regularly to log into different services. Most probably rely on Google Authenticator and similar tools. But what about building one by ourselves?
| | www.dannyguo.com
4.1 parsecs away

Travel
| | [AI summary] The author discusses their decision to migrate from Authy to Bitwarden for managing two-factor authentication (2FA) codes, highlighting issues with Authy's backup, syncing, and CPU usage, while detailing the benefits and setup of Bitwarden.
| | labanskoller.se
2.7 parsecs away

Travel
| | You probably use an "authenticator app" such as Google Authenticator to enable two-step verification (sometimes called two-factor authentication, 2FA, or multi-factor authentication, MFA) for an online account. The method is called Time-Based One-Time Password Algorithm (TOTP) and is standardized in RFC 6238. In October 2017 when I evaluated HashiCorp Vault for generating and storing TOTP secrets for a system at work I realized that the Android version and iOS version of Google Authenticator differed a lot when it comes to which modes are supported.
| | 128bit.io
22.9 parsecs away

Travel
| Ok, lets start with something easy! :) What are SSH keys: SSH keys are a way to allow someone access to a user on another system without the need for a password. This is done with 2 key files one that is public and the other private. This is called "Public-key cryptography". The public key will be sent to the server that you want to connect to and the private will stay on your local (orclient) system.