About 50 results
Open links in new tab
  1. authentication - Authy backup password issue - Information Security ...

    Apr 21, 2017 · I have enabled Authy backups on my phone, and set the password. Then I installed the Chrome app on my PC, after I input backup password, the screen shows "Re-encrypting accounts". …

  2. Authy: Does multi-device mode imply that all keys are stored on their ...

    My understanding is that if you use Authy, without backups/multi-device options, none of your account keys are stored on their servers. It all resides on your single device. Ie, even if Authy se...

  3. Authy - is my backup secured by only my password or 2FA s well

    Aug 22, 2016 · I've read around the Authy site and done a few Google searches, but it is not clear to me whether an attacker that compromised my Authy account backup password could access my keys …

  4. multi factor - Is it safe to save a screenshot of my QR code ...

    Aug 15, 2019 · Authy also displays the remaining time before a token times out so that you can see if it is about to expire. I also take a screenshot of every QR code so that I can register it again with a new …

  5. totp - How does Authy implement multi-device mode? - Information ...

    Dec 14, 2020 · The accepted answer conflates Authy's multi-device mode with its cloud backup feature. I am specifically not asking about the cloud backup feature, but about the multi-device mode which is …

  6. How does Authy's 2FA work, if it doesn't connect to the server?

    If Google were HOTP and Authy wanted to support Google accounts, their app would have to generate and store the counter value differently from TOTP accounts. Does HOTP client require connection …

  7. Why is Authy (or TFA in general) considered more secure than just ...

    Sep 1, 2021 · Why is the use of Authy TFA more secure than just having a long password? Presumably the user will record his Authy code right along side his normal password. The net result being that …

  8. authentication - Are Authy's SMS tokens insecure? - Information ...

    Aug 2, 2018 · Let us review the threat: MiTM - SS7 attack to retrieve the SMS for Authy. If that scenario happens, the attacker will have a grasp over your encrypted tokens meaning that the attacker needs …

  9. Can I have push notification authentication without a third party app ...

    Apr 7, 2018 · Third-party authentication apps like Authy just simplifying this for you and usually, the user will use additional applications that require 2fa of a sort.

  10. Authy 2FA best practices - Information Security Stack Exchange

    Sep 8, 2016 · Secondly, the Authy OTP seeds between each of these devices ARE DIFFERENT. Here is a side-by-side image of the Authy Desktop app and the Authy iPhone app. Notice the values are …