• argv_minus_one@beehaw.org
    link
    fedilink
    arrow-up
    0
    ·
    10 months ago

    I personally am afraid of this. What if something gets botched? I’ll be permanently locked out of my account!

    • emptyother@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      10 months ago

      I’d prefer me getting permanently locked out over someone who isnt me getting allowed in. Even more so to services which have my credit card number.

      But unlikely anyway, as long as I save my pass and 2fa to a password manager, and keep the backup codes backed up.

  • Gamey@feddit.rocks
    link
    fedilink
    arrow-up
    0
    ·
    10 months ago

    Good, people are fucking stupid and if it effects others it’s often better to choose the security for them!

    • NekuSoul@lemmy.nekusoul.de
      link
      fedilink
      arrow-up
      0
      ·
      10 months ago

      Yup. I’m actually a bit baffled by how much negativity/misinformation there’s around 2FA even in a place like this, which should naturally have a more technically inclined userbase.

      • argv_minus_one@beehaw.org
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        10 months ago

        I dislike MFA because it creates a risk of losing access to my account. I can back up my passwords; I can’t back up a hardware device.

        • meteokr@community.adiquaints.moe
          link
          fedilink
          arrow-up
          0
          ·
          10 months ago

          A hardware device is a physical key. Its no different than backing up your home key. Get two keys and copy them. Keep one on you, and the other in a safe somewhere in case you lose the first.

          • argv_minus_one@beehaw.org
            link
            fedilink
            arrow-up
            0
            ·
            edit-2
            10 months ago

            Hardware tokens are specifically designed to resist copying. Any means of copying it would be considered a security vulnerability.

            Bits rot. A hardware token kept in a bank vault may or may not still work when I need it 10 years later, and there is no reasonable process for regularly verifying the integrity of its contents. Backup drives’ checksums are verified with every backup cycle, and so are the checksums on the file system being backed up (I’m using btrfs for that reason).

            Hardware tokens are expensive. Mechanical lock keys are not.

            • meteokr@community.adiquaints.moe
              link
              fedilink
              arrow-up
              0
              ·
              10 months ago

              Not literally copy, as in have an extra set of keys. A spare key. A bank vault is total overkill. I just bought 2 fido2 keys and register both for the services that support them. Have one on your keychain and another in your desk. 2FA is often way over thought, any adversary needs both factors so something you know and something you own is plenty for most people.

              • argv_minus_one@beehaw.org
                link
                fedilink
                arrow-up
                0
                arrow-down
                1
                ·
                10 months ago

                How will I notice when the spare fails, if it’s only a spare and I don’t regularly use it? Then I’m down to only one key, and as any grumpy backup admin will tell you, if you have only one copy of something, you have zero copies.

                I would have a key plugged into the computer pretty much all the time when I’m working, so anyone who compromises the computer can impersonate me as long as I’m at work. This would be mildly inconvenient to the attacker, but wouldn’t actually stop the attacker. And if the computer isn’t compromised, how is anyone going to get into my GitHub account even without 2FA? They certainly aren’t going to do it by guessing my 16-character generated password or Ed25519 SSH key.

                Something-I-know is worthless for authentication in the age of GPU password cracking. Most humans, including myself, do not have photographic memories with which to memorize cryptographically secure passwords. We’re all using password managers for a reason, and a password database is something you have, not something you know.

  • Otome-chan@kbin.social
    link
    fedilink
    arrow-up
    0
    ·
    10 months ago

    No offense to companies but I’m honestly sick of companies forcing 2fa. Every single one seems to have a different shitty way of doing it. Like why on earth do I need two different authenticator apps on my phone (authy&google authenticator)? Some do sms/phone number, but then yell at you and prevent you from doing 2fa if you have a “bad phone number”. This happened on discord where I’m locked out of certain servers because I can’t do phone verification, and I can’t do it because discord doesn’t like my phone number. Twitter was the same way for a long while (couldn’t do 2fa/phone verification due to them not liking my number).

    From the article it sounds like they’re doing authenticator app or sms. I’m guessing sms won’t work for me, so app it is. I decided to dig to see which authenticator app they use and they list: 1password, authy, lastpass, and microsoft… no google?

    Honestly, even email requirements for accounts is annoying because you know it just ends up spamming you. is the future where we’re gonna have to have 30 different authenticator apps on our phone?

    • SkaveRat@discuss.tchncs.de
      link
      fedilink
      arrow-up
      1
      ·
      10 months ago

      Like why on earth do I need two different authenticator apps on my phone (authy&google authenticator)?

      you… don’t?

      Both of these implement exactly the same protocol (TOTP). Used authy for all my Top Of The Pops Time-based one-time password needs exclusively, before moving everything to bitwarden