- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
I use Authy for 2FA but know little about the underlying technology. Does this mean my accounts that use Authy for 2FA may now be compromised? Or is it just my phone number? Because my phone number has been out in the wild for a long time already…
Didn’t read this but I ditched authy a year ago (close call!)
I recommend using Aegis (you can export and import everything all at once)
You can then use syncthing to keep your phone and other devices in sync.
@[email protected] I just want to add that Aegis is also open source, unlike Authy
Even if you don’t mind your phone number getting leaked because it’s already out there I would recommend to switch away from a closed source software that requires your phone number for no good reason. Even if it’s just to send a signal that this is not ok.