this post was submitted on 11 Sep 2023
74 points (97.4% liked)

Privacy

31932 readers
794 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Is this some sort of a convenience feature hidden behind a paywall to justify purchasing their subscriptions or does generating the codes actually cost money? If the latter is the case, how do applications like Aegis do it free of cost?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 35 points 1 year ago (4 children)

The reason that 2fa exists is not to protect you if someone gets their hands on your device. It's to protect you if your "static" credentials leaked from a providers' database or you otherwise got phished. Using a password manager to handle mfa is totally reasonable.

[–] [email protected] 10 points 1 year ago

If you are really worried about the password manager being an intrusion vector, secure your vault with a hardware key.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago) (1 children)

Agree. That's another reason to always suggest KeePass!

[–] [email protected] 3 points 1 year ago

You can be paranoid and split the two, but most people(99%) will be perfectly fine with KeePass.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

It is reasonable yet subpar under a threat model where you do not trust any single provider, which is a model I find appropriate most of the time.

[–] [email protected] 1 points 1 year ago

There are other ways your password database could leak. For example you could use a weak password, or it could leak in some way, and if you store it on a cloud service that also got compromised you'd be fucked without a compromised device.

But yeah, all these are much less likely.