1067
you are viewing a single comment's thread
view the rest of the comments
[-] dharmacurious@slrpnk.net 2 points 1 day ago
[-] nogooduser@lemmy.world 14 points 1 day ago

App based 2FA is better. Either the app generates a time based code that you enter into the site or the site sends a push notification to the app asking you to verify the login attempt.

Passkeys are good too as they replace the password completely and leave the 2FA part to the device.

[-] victorz@lemmy.world 4 points 1 day ago

Passkey or notification please. So sick of entering these codes on a daily basis.

[-] Opisek@piefed.blahaj.zone 4 points 1 day ago

If it's alright with your threat model, you can put the time-based OTPs into your password manager of choice, like Bitwarden. Upon filling your username and password, it places your OTP in your clipboard, so that you can simply paste it in. This does of course reduce the security of the system slightly, since you centralize your passwords and your OTPs. When opting for this method, it is therefore imperative to protect your password manager even more, like via setting up 2FA for the password manager itself or making sure your account gets locked after something like 10 minutes of inactivity. The usability aspect is improved by using a yubikey or another similar physical key technology.

load more comments (1 replies)
load more comments (2 replies)
load more comments (3 replies)
this post was submitted on 10 Oct 2025
1067 points (100.0% liked)

Programmer Humor

26827 readers
974 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS