• ignirtoq@fedia.io
    link
    fedilink
    arrow-up
    5
    ·
    6 months ago

    I use Authy for 2FA but know little about the underlying technology. Does this mean my accounts that use Authy for 2FA may now be compromised? Or is it just my phone number? Because my phone number has been out in the wild for a long time already…

    • RandomLegend [He/Him]@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      6 months ago

      Didn’t read this but I ditched authy a year ago (close call!)

      I recommend using Aegis (you can export and import everything all at once)

      You can then use syncthing to keep your phone and other devices in sync.

    • brrt@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      6 months ago

      Even if you don’t mind your phone number getting leaked because it’s already out there I would recommend to switch away from a closed source software that requires your phone number for no good reason. Even if it’s just to send a signal that this is not ok.