What’s your prefer two-factor authentication app for iOS?

I’m looking for an app that offers the best combination of platform compatibility (preferably available on Mac OS, iPad OS, and iOS), security, usability, and reliability.

It would be great if the app is open source and has a backup feature as well.

I came across a recent Wirecutter article from The New York Timesthat recommends Cisco DUO Mobile as the top choice, followed by Authy and Google Authenticator.

I would greatly appreciate your insights and security perspectives.

Thank you!

  • remus@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    Doesn’t this defeat the purpose of multi factor authentication though? If someone got access to 1Password, they could access both your password and secondary authentication code. I think it may be a better idea to keep them separate.

    • notjvb@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Pretty big “if” since I’m the only one who knows the long password, I rotate it often, and I hold the keys to encrypt everything. You’re right it’s a single point of fail but a LOT would have to go wrong for it to fail.

      Edit: plus 1P supports physical 2FAs to get into the vault itself, if that helps

      • Confetti@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Whats the point of rotating your masterpassword? Seems kinda like a disaster waiting to happen since you will have trouble memorizing it unless you’re updating/creating an emergency sheet each time. A high entropy passphrase + a hardware security key (the best choice) or totp should be more then enough for years unless technology skyrockets no?

        • Redex@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          It could be useful if somebody somehow finds out their password, e.g. by shoulder surfing or perhas some other way.

          Then their attack window is much more limited.