It was one of the easiest to setup and it works flawlessly. I’m a bit paranoid about losing my data even with the backups… Any recommendation?

  • Widget@kbin.social
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    It still defends against one failure mode (the website gets hacked but you’re ok) but yeah, obviously if you get hacked and the hacker knows how to get your vault out then you’re 100% screwed.

    My suggestion is always hardware 2FA, even though it’s not as mature as the other systems. Personally I have two Yubikeys (in case one breaks/gets lost) but it does mean that I need to add TOTPs to both of them each time I add a new 2FA.

    • boothin@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      I’m fairly certain hardware based 2fa has been around since the early 90s maybe even earlier. It’s not the maturity that’s the issue, as I’m fairly certain its significantly older than application based, but that it’s extremely inconvenient for the user to have to buy a physical key and keep it safe

      • Widget@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        I don’t mean that it’s not old, I mean that it’s still got some more room for improvement. Passkeys, for instance, are an attempt at improving the user experience.