LisPi · @lispi314
295 followers · 4339 posts · Server mastodon.top

@hotkey As good a moment as any to note that banks are directly ignoring recommendations in using

pages.nist.gov/800-63-3/sp800-

#nist #sms2fa

Last updated 2 years ago

Ralf Bachmann · @ralfbachmann
25 followers · 112 posts · Server mastodon.social

2-Factor Authentication App "Authy". Same App (Cloud) for many devices and OS.

authy.com/

SMS 2FA

#sms2fa #2fa #2factorbypass #2factorauthetification #authy

Last updated 2 years ago

LisPi · @lispi314
223 followers · 3306 posts · Server mastodon.top

@ScriptFanix @BernetaWrites Yeah, that's been a suspicion with the cancellation with no plans to explain how to switch to other safer authenticators & no care for the issues of just leaving accounts with only single-factor authentication.

Automated bots sitting on cracked lists of leaked passwords & reaping those accounts the second SMS2FA goes out.

#sms2fa

Last updated 2 years ago

LisPi · @lispi314
219 followers · 3259 posts · Server mastodon.top
LisPi · @lispi314
217 followers · 3223 posts · Server mastodon.top

@mastodonmigration

🗑️ 🚮 🚮🗑️

#sms2fa #FreeTwitter

Last updated 2 years ago

Stark · @Stark9837
27 followers · 154 posts · Server techhub.social

@toomas_ilves why you would even pay to use such a weak form of is over my head.

I personally removed from all websites after realizing my sim and account were connected to my family, and family members fell for scams and social engineering phising.

apps and keys such as ubikey are the only way to go.

#2fa #sms2fa #authenticator #hardware

Last updated 2 years ago

LisPi · @lispi314
204 followers · 3037 posts · Server mastodon.top

@Torchwood Huh that's weird, it's working on my end. Well, in any case it's just a short statement by myself about > and a link to as a reference: pages.nist.gov/800-63-3/sp800-

#totp #sms2fa #nist

Last updated 2 years ago

LisPi · @lispi314
204 followers · 3037 posts · Server mastodon.top

@remi @cstross Refusal to learn from the past is responsible for a lot of the current issues.

Some of it wasn't even just refusal, but trivialization of the problems too as inconsequential.

I think part of it has to be addressed in education going forward.

Also the mentioned continued use of deeply annoys me. It should be criminal for any business to do so at this point.

mastodon.top/@lispi314/1098128

#sms2fa

Last updated 2 years ago

LisPi · @lispi314
179 followers · 2474 posts · Server mastodon.top

@matthew_d_green Some password managers, namely can handle 2FA.

That does technically reduce it to single-factor but anyway, still an option. Adding isolation style is probably a good idea to prevent easy compromise .

Regarding , I've taken to reposting this when someone mentions it: pages.nist.gov/800-63-3/sp800-

#keepassxc #qubes #sms2fa #sms

Last updated 2 years ago

LisPi · @lispi314
135 followers · 2020 posts · Server mastodon.top

@glyph I do need to highlight that is insecure and basically worthless.

pages.nist.gov/800-63-3/sp800-

is a much better scheme.

So it's not just a lack of more robust authentication, it's also just pure neglect in avoiding what's currently considered bad practice by many service providers.

#2fa #sms2fa #totp #sms

Last updated 2 years ago

LisPi · @lispi314
118 followers · 1906 posts · Server mastodon.top

@eevee I've no particular love for but even they recognize is a terrible idea.

Email is barely any better.

pages.nist.gov/800-63-3/sp800-

#nist #sms2fa

Last updated 2 years ago