Everyone should be using multifactor authentication (MFA) to further secure their online accounts – especially accounts deemed crucial, such as email and bank accounts. Stronger forms of MFA, which involve using an authenticator app or a hardware key, provide an enhanced layer of protection from would be account takeovers.

In an ideal world, users would always use secure physical keys as a form of MFA when signing into devices, webapps, or web services – however, real-world limitations, such as support for hardware keys, do exist.

However, we have a decent compromise in the form of software-based authenticators, which primarily used time-based one-time codes (TOTP) to authenticate a sign-in attempt. Not all software authenticators are built the same and ideally, users would avoid Google Authenticator, Microsoft Authenticator, and Authy.

At minimum, users are highly encouraged to ditch Authy – and not just because of the Twilio breach compromising Authy codes. Rather, Authy does not allow exportation of existing codes/tokens. Therefore, the more accounts used with Authy, the harder it is/longer it takes to effectively migrate to another solution.

Please remember: migration from Authy is not impossible no matter how many accounts you have. It just requires some time!

Physical keys offer superior secure MFA capabilities.

Generally, physical security keys can use multiple forms of authentication; most commonly, physical keys support Hash/HMAC (based) One Time Password (HOTP) and TOTP for authentication. Physical keys also support U2F and the FIDO2 standard, which can prove resistant to phishing attacks.

nitrokey logo

Nitrokey is a physical security key based on open-source firmware and software. Firmware installed on the Nitrokey can be exported and subsequently verified. The device is secured with a PIN and is resistant to brute force attacks.

Outside of MFA, Nitrokey has a few uses for enhanced security relevant to privacy and cybersecurity conscious users:

  • PGP key storage; sign and encrypt emails
  • Encrypted mobile storage
  • “Hidden” encrypted storage (just as it sounds)
    The Nitrokey hardware functions independently of operating systems, providing resistance against theft, loss, malware, and phishing campaigns.

There are a few Nitrokey models available – each key comes with different features. Most users should find the Nitrokey FIDO2 satisfactory for most authentication applications. However, users are encouraged to view the Nitrokey comparison chart to make an informed decision about which model fits best for their use.

Purchase | Source

yubico logo

Note: The firmware for the Yubikey is closed-source software. Additionally, the firmware for Yubikeys cannot be updated.

Where possible, avoidthehack tries not to recommend closed-source solutions, but Yubikey has a stellar reputation for security. As of writing, it’s also the most popular physical key. Fortunately, Yubico’s clients are open source; the firmware is closed-source.

There are a few YubiKey models available. Different models include different features, similar to NitroKey models. Users are encouraged to review Yubico’s comparison chart to find the model that suits their needs best.

However, for most users, the SECURITY KEY SERIES and the YUBIKEY 5 SERIES should prove sufficient for most applications.

Purchase | Source


Like the Nitrokey, the Librem key is based on open-source firmware. Unlike the Nitrokey and Yubikey, the Librem Key offerings are vastly simpplified into one product model.

The Librem key boasts 20+ year of storage time and is the same size as the average thumb drive. For basics, this hardware key can store up to 4096-bit RSA keys and up to 512-bit ECC keys. Like the other recommended hardware keys here, encryption and decryption occurs on the Librem Key itself.

Librem key also features tamper detection, limited password manager storage (up to 16 entries), HOTP token, and TOTP token storage.

Purchase | Source

Software based authenticators primarily use Time-based One Time Passwords (TOTP) for authentication. They tend to be more convenient while still offering a relative high degree of secure authentication. Generally, they’re designed for mobile devices, such as smartphones.

red shield logo of 2fas

2FAS is an open-source software authenticator. No account is required for use.

2FAS can automatically sync end-to-end encrypted backups of codes to the cloud (depends on the device, for example, Apple devices will automatically sync to iCloud).

2FAS is available for iOS and Android devices. Though there is no official web version (nor desktop apps), 2FAS has a browser extension for both Chromium and Gecko browsers; the browser extension syncs after pairing with the mobile device.

2FAS does not store passwords or associated metadata and works offline.

Download | Source

ente auth logo

Ente Auth is an open-source software authenticator built by the same core developers behind ente.io. Unlike ente’s paid encrypted photo storage service, ente Auth is free.

Tokens/Secrets are end-to-end encrypted and stored using ente’s infrastructure. While ente uses third-party cloud providers as part of their infrastructure, data stored is encrypted without the cloud provider having access to the decryption keys.

Ente Auth is available for iOS and Android devices.

A web version is available for viewing secrets, which is accessible from any internet enabled device; this aspect could make ente Auth a more viable option for users who want more availability from a MFA/2FA authenticator app – especially if their mobile device is lost, stolen, or otherwise not available.

Download | Source

raivo logo

As of July 2023, Raivo OTP has been acquired by “Mobime.” It remains to be seen what will change, if anything.

Raivo OTP is a secure lightweight and open-source authenticator.

It allows for easy addition of codes, supporting scanning of QR codes and manually inputting. It supports adding custom icons for one time passwords and the ability to search one time passwords, making finding the appropriate code easier.

Raivo OTP can sync/backup tokens to iCloud or export tokens to encrypted ZIP archives.

Raivo OTP is only available for iOS and macOS.

Download | Source

aegis logo

Aegis Authenticator is a secure and open-source authenticator.

One-time passwords are stored in an encrypted vault, where users have the option to set a password or encrypt the vault with biometrics (if supported by the device.) For organization, Aegis Authenticator can set a custom icon for each entry or search by account name to locate the appropriate token; additionally, users can create custom groups for further organization and sorting.

Aegis Authenticator supports exporting codes and can be configured to automatically backup codes to a trusted cloud solution, such as Nextcloud.

Aegis Authenticator is only available for Android and is available on both the Google Play Store and F-Droid.

Download | Source

bitwarden logo

In addition to being a free, open-source, and feature-packed password manager, the premium version of Bitwarden – Bitwarden Premium – offers Bitwarden Authenticator alongside the traditional password manager.

The Bitwarden Authenticator is included in the password manager itself and can handle TOTP authentication just like other dedicated software-based authenticators. Bitwarden Authenticator paired with the Bitwarden password manager makes managing passwords and TOTP codes simple.

Of the software authenticators, Bitwarden has the most portability and device compatibility. It also supports exporting codes and searching for tokens inside the encrypted vault.

However, it’s certainly worth noting Bitwarden Authenticator integrated with the password manager (simplicity) comes with a slightly elevated risk due to passwords and TOTP codes being in one place. In the event a user’s vault is compromised, then this creates a bigger single point of failure – the passwords and the TOTP secrets also become compromised.

To alleviate this risk, users should ensure:

  • The master password to their Bitwarden vault is strong and unique.
    • This should ideally be a passphrase.
    • If feasible, this password shouldn’t be written down anywhere else – at minimum, the master password shouldn’t be stored on the devices with Bitwarden installed.
  • Bitwarden recovery codes are stored in a secure location.
  • For self-hosting users:
    • Ensure the machine hosting the Bitwarden instance is secured

Download | Source

Support strong authentication standards

Hardware keys listed here should support FIDO U2F and FIDO2.

Have open-source clients

Clients used to interact/manage hardware keys listed here should be open-source to promote transparency and leverage the global community to identify flaws/weaknesses. Ideally, the firmware of the key would also be open-source, but open-source firmware isn’t a strict requirement.

Be tamper resistant

Tamper-resistant keys provide enhanced protection from situations where the host machine is compromised and makes cloning the hardware key itself exceedingly harder than it currently is.


Hardware keys listed here should be well-made enough to stand up to normal wear and tear, where users can get reliable years out of them. Specifically, the USB part of the key should be capable of withstanding normal wear and tear associated with being plugged into and removed from devices.

Be open-source

Open-source solutions promote transparency.

No trackers embedded in software

Software authenticators listed here should have no tracking mechanisms/trackers embedded in software.

Allow exporting of codes

Software authenticators should allow easy exporting of TOTP codes/tokens. This helps ensure users are not trapped into a specific authenticator, as is the problem with closed-source authenticators like Authy.

Secure multifactor authentication helps stop malicious account takeovers; it is actually a recommended “basic” to improve any given user’s personal cybersecurity posture.

Users should keep their method of secure multifactor authentication secure. For physical keys, this could include storing the key in a safe place where it would not easily get lost. For software authenticators, this can include ensuring the device where the authenticators “live” is secure and resistant to compromise.

Remember – store backups encrypted and in a safe location! If the safe location is offline, then make sure the storage location is physically secured and a place you have primary access to.

With that said, stay safe out there!

Original Article Source link

Affiliate tivustream.com partecipa al Programma di Affiliazione Amazon EU ed in qualità di Affiliato Amazon tivustream.com riceve un guadagno (commissione) dagli acquisti idonei effettuati sul sito Amazon.it provenienti dai link proposti negli articoli o pagine di questo sito .
Views: 0


Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.