1092
you are viewing a single comment's thread
view the rest of the comments
[-] undefined@lemmy.hogru.ch 78 points 5 days ago

SMS/email-based 2FA should die.

Luckily, you don't even need to check SMS or input a valid number with the “verification” in the screenshot!

[-] bamboo 29 points 5 days ago

mission failed successfully

[-] nogooduser@lemmy.world 12 points 5 days ago

It’s better than nothing and some people would really struggle to do other types of 2FA.

[-] djsoren19 7 points 5 days ago

I'll be homest with you, some people really struggle with email 2fa. The amount of working Americans I have spoken with who don't understand how to have two tabs open at once is genuinely frightening.

[-] Natanael@infosec.pub 6 points 5 days ago

As a reset method it's worse than having nothing

[-] null@lemmy.nullspace.lol 4 points 5 days ago

It's wild how standard SMS is given how (relatively) trivial it is to exploit.

[-] undefined@lemmy.hogru.ch 1 points 4 days ago

Even with autofilling it on iOS, macOS you still have developers that need to fuck with form fields using JavaScript because they think they’re smarter than you.

[-] dharmacurious@slrpnk.net 2 points 5 days ago
[-] nogooduser@lemmy.world 14 points 5 days ago

App based 2FA is better. Either the app generates a time based code that you enter into the site or the site sends a push notification to the app asking you to verify the login attempt.

Passkeys are good too as they replace the password completely and leave the 2FA part to the device.

[-] psud@aussie.zone 1 points 3 days ago

I wonder if there are any TOTP apps for Linux phones (though I think I'll have to keep an Android or Apple device around for my workplace's 2FA which doesn't have anything for anything other than apple and Android phones, and only with full security)

[-] victorz@lemmy.world 4 points 5 days ago

Passkey or notification please. So sick of entering these codes on a daily basis.

[-] Opisek@piefed.blahaj.zone 4 points 5 days ago

If it's alright with your threat model, you can put the time-based OTPs into your password manager of choice, like Bitwarden. Upon filling your username and password, it places your OTP in your clipboard, so that you can simply paste it in. This does of course reduce the security of the system slightly, since you centralize your passwords and your OTPs. When opting for this method, it is therefore imperative to protect your password manager even more, like via setting up 2FA for the password manager itself or making sure your account gets locked after something like 10 minutes of inactivity. The usability aspect is improved by using a yubikey or another similar physical key technology.

[-] RaivoKulli@sopuli.xyz 1 points 5 days ago

I just save the cookies tbh

[-] djsoren19 1 points 5 days ago

Okay, but then you have to develop an app

[-] PlexSheep@infosec.pub 1 points 5 days ago

TOTP, FIDO2 or not worrying about logins and just using {GitHub,Google,Microsoft,selfhosted.lan} as identity provider with OIDC

this post was submitted on 10 Oct 2025
1092 points (100.0% liked)

Programmer Humor

26860 readers
237 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS