Explore >> Select a destination


You are here

tilde.town
| | www.dannyguo.com
2.8 parsecs away

Travel
| | [AI summary] The author discusses their decision to migrate from Authy to Bitwarden for managing two-factor authentication (2FA) codes, highlighting issues with Authy's backup, syncing, and CPU usage, while detailing the benefits and setup of Bitwarden.
| | juliaferraioli.com
2.7 parsecs away

Travel
| | 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) are ways of securing accounts above and beyond normal password protection. Typically, we think of 2FA as something you know (your password) and something you have (a device). The idea is that if you compromise one, you still cant get access to the protected resource. A room protected by a keypad and ID card reader is a great example of 2FA. You might be able to guess the code, but youd also need a valid ID card to get access to the locked...
| | labanskoller.se
3.0 parsecs away

Travel
| | You probably use an "authenticator app" such as Google Authenticator to enable two-step verification (sometimes called two-factor authentication, 2FA, or multi-factor authentication, MFA) for an online account. The method is called Time-Based One-Time Password Algorithm (TOTP) and is standardized in RFC 6238. In October 2017 when I evaluated HashiCorp Vault for generating and storing TOTP secrets for a system at work I realized that the Android version and iOS version of Google Authenticator differed a lot when it comes to which modes are supported.
| | www.cossacklabs.com
25.0 parsecs away

Travel
| Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target in the hands of skilful attackers.