Skip to main content


Most people are more likely to lose authenticator tokens (their phone, their yubikey) than be hacked by a sophisticated attacker

Password manager 2FA and SMS 2FA solves the threat model that most people live in

(Organizational security has a far different threat model)
@silverwizard But cloud password managers are likely to be hacked as well πŸ˜•
Which is more likely: a second LastPass situation or me washing my Yubikey?
Which is more likely - Becky losing her phone number or a second LastPass?
@silverwizard A second LastPass, but some SMS 2FA attack vectors don’t require you to lose your phone number, so I’m partial.
Oh, no - attacking SMS 2FA is easy to just SIM hijack

I am talking about getting locked out because you accidentally lost your auth app
@silverwizard Still LastPass, these days losing a *phone number* is pretty hard to do.
That's what I'm saying
You won't lose your phone number for SMS or password manager

Whereas losing a phone with an TOTP authenticator setup or losing a yubikey is pretty simple
So far, every service for which I've registered TOTP (Twitter, Facebook, Mastodon) has offered recovery codes in case I lose my TOTP device. Surely that mitigates @silverwizard 's loss model.

@hypolite
And I keep my paasword manager DB on several devices. Does that make me as weird as @silverwizard ?

@hypolite
Does KeePass do TOTP these days?
@silverwizard What's TOTO? I have a KeePass TOTP plugin that I use as the truth source for all my TOTP tokens. Based on the seed it can generate a QR code that token apps can read.
Also - I am a terrible example because I have a backup yubikey to sign up two tokens
Mostly I find myself weirded out by people acting like authenticator apps are high friction in comparison to SMS 2FA. The user experience of "hopefully the code arrives quickly" makes it just that bit unpleasant even when they often *do* come promptly. (Yubikeys have a very obvious $$ barrier to being the norm for individuals.)
Yeah, I just only have the option of Google TOTP which squicks me, or Yubico TOTP which needs a key, so uh, kinda fails the access test

But also - I am *far* more likely to lose a phone than by hit by SIM swapping (to be clear - only because I'm a dumbass)
Yeah, most of my TOTP tokens are mirrored across my Yubikeys largely to save headaches when changing phones. I have one on Entrust's app that I can't do that with and the couple of times I've had to move it were a pain finding the instructions again.

But using Yubico TOTP also basically primed me for "password manager TOTP is functionally the same as Google TOTP but with the convenience of device portability"
Well, the issue most people have with password manager TOTP is that then if your password manager is compromised, then your password is

And the answer to that is "it's complicated" - but yeah - in a perfect world we'd all have two security keys, and one is kept in a secure location and one is kept in a wallet/keychain - but that's not feasible (says the man with that)
@β›… w chance of bears Although for authenticator apps, the high friction comes when the device where tokens are installed disappears for some reason (repairs, theft, replacement). Then the real uphill battle starts.
⇧