About 50 results
Open links in new tab
  1. Authy: Does multi-device mode imply that all keys are stored on their ...

    My understanding is that if you use Authy, without backups/multi-device options, none of your account keys are stored on their servers. It all resides on your single device. Ie, even if Authy se...

  2. Authy 2FA best practices - Information Security Stack Exchange

    Sep 8, 2016 · Secondly, the Authy OTP seeds between each of these devices ARE DIFFERENT. Here is a side-by-side image of the Authy Desktop app and the Authy iPhone app. Notice the values are …

  3. authentication - How can Authy use Google Authenticator QR ...

    Jan 30, 2018 · I was just reading around and found it really fascinating that Authy can use Google Authenticator implementations anywhere. How does Authy does this? Isn't this a security risk?

  4. authentication - Authy backup password issue - Information Security ...

    Apr 21, 2017 · I have enabled Authy backups on my phone, and set the password. Then I installed the Chrome app on my PC, after I input backup password, the screen shows "Re-encrypting accounts". …

  5. totp - How does Authy implement multi-device mode? - Information ...

    Dec 14, 2020 · The accepted answer conflates Authy's multi-device mode with its cloud backup feature. I am specifically not asking about the cloud backup feature, but about the multi-device mode which is …

  6. Why is Authy (or TFA in general) considered more secure than just ...

    Sep 1, 2021 · Why is the use of Authy TFA more secure than just having a long password? Presumably the user will record his Authy code right along side his normal password. No, the user should not do …

  7. Authy: Do cloud backups update automatically after each added 2 …

    Jan 15, 2018 · I read the Authy docs about how the cloud back up works. But there is one thing I'm unclear on. Do you have to manually disable and re-enable cloud backup, and set up a new one after …

  8. authentication - Are Authy's SMS tokens insecure? - Information ...

    Aug 2, 2018 · Let us review the threat: MiTM - SS7 attack to retrieve the SMS for Authy. If that scenario happens, the attacker will have a grasp over your encrypted tokens meaning that the attacker needs …

  9. How does Authy's 2FA work, if it doesn't connect to the server?

    In Authy's case, when the user submits a passcode to the server, the server looks up the user's seed data, calculates the counter value based on the timestamp of the request and then generates the …

  10. multi factor - The Wrong Icon for NordVPN on Authy - Information ...

    Sep 3, 2021 · I recently turned on the multi-factor authentication on NordVPN and I use Authy for the authenticator. After scanning the QR code on the website, I found that the icon displayed in the …