this post was submitted on 11 Sep 2023
35 points (97.3% liked)

Privacy

31934 readers
638 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Is this some sort of a convenience feature hidden behind a paywall to justify purchasing their subscriptions or does generating the codes actually cost money? If the latter is the case, how do applications like Aegis do it free of cost?

you are viewing a single comment's thread
view the rest of the comments
[–] beeb@lemm.ee 15 points 1 year ago (4 children)

The reason that 2fa exists is not to protect you if someone gets their hands on your device. It's to protect you if your "static" credentials leaked from a providers' database or you otherwise got phished. Using a password manager to handle mfa is totally reasonable.

[–] 4am@lemm.ee 3 points 1 year ago

If you are really worried about the password manager being an intrusion vector, secure your vault with a hardware key.

[–] danileonis@lemmy.ml 3 points 1 year ago* (last edited 1 year ago) (1 children)

Agree. That's another reason to always suggest KeePass!

[–] Acters@lemmy.world 3 points 1 year ago

You can be paranoid and split the two, but most people(99%) will be perfectly fine with KeePass.

[–] amju_wolf@pawb.social 1 points 1 year ago

There are other ways your password database could leak. For example you could use a weak password, or it could leak in some way, and if you store it on a cloud service that also got compromised you'd be fucked without a compromised device.

But yeah, all these are much less likely.

[–] ddnomad@infosec.pub 1 points 1 year ago* (last edited 1 year ago)

It is reasonable yet subpar under a threat model where you do not trust any single provider, which is a model I find appropriate most of the time.