![]() ![]() Once the backup has been completed, you can restore it on any other device, by signing into the Authy app with your registered phone number, and by providing the backup password. During the initial setup, the app prompts you to enter the backup password, which is used to encrypt the backup locally on your device, before being uploaded to their servers. ![]() ![]() One of the best things we’ve found about Authy is that it allows you to backup the list of 2FA enabled accounts, which you have linked using the app. Once logged in using the OTP, you can start using Authy just like the original Google Authenticator app. Authy will then send you an SMS to the registered mobile, containing a one-time-password (OTP). Once you have installed the app, you will be asked to register a new account using your mobile number and email address. It also has a Google Chrome app & extension, so that it can run on just about any desktop OS. And if you lose any of your 2FA configured devices, you still would have a backup device to generate 2FA codes on.Īuthy is a RFC 4226 / RFC 6238 based 2FA client, compatible with Google Authenticator, available for macOS, iOS and Android. You no longer need a smartphone to authenticate yourself while using your computer. Such solutions will also help address both the issues we discussed above. Also, if you somehow lose access to that smartphone, the process to restore access could be complex one sometimes even resulting in a temporary lockout.īut in this article, we’ll explore a few workarounds to use Google Authenticator directly on the computer. It implements the Time-Based One-Time Password Algorithm ( TOTP) and HMAC-based One-time Password Algorithm ( HOTP) to generate unique 6-Digit authentication codes for each of the linked accounts, and doesn’t require Internet access to work.Įven though Two-Factor-Authentication is a more secure option, it could sometimes feel a little inconvenient to open up a smartphone app every time you want to login to a specific online account or service, on your computer. The official Google Authenticator app is only available on iOS and Android platforms, with certain third party alternatives available for BlackBerry and Windows Phones. At least there's an Apple Watch app for those who want it.Google has its own version of two-factor authentication service, which is nowadays supported by various third party online services. Authy’s Help Center offers a strategy to mitigate the vulnerability, but we'd prefer it just worked more like other authenticator apps. We're not fans of this requirement, since we’d rather have the app consider our phones to be anonymous pieces of hardware and some have suggested that requiring a phone number opens the app up to SIM-card-swap fraud. Unlike the other apps listed here, Authy requires your phone number when you first set it up. It also means that authorities cannot force Authy to unlock your accounts. The password is only known to you, so if you forget it, Authy won’t be able to recover the account. There’s also an option to enter a private password or passphrase which Authy uses to encrypt login info for your accounts to the cloud. However, it’s somewhat concerning that you can add the account to a new phone using “a PIN code sent via a call or an SMS,” according to Authy’s support pages. One of Twilio Authy’s big advantages is encrypted cloud backup. Below our recommendations, you'll find more information on just how these apps work to keep you safe, as well as criteria you should consider when choosing one. If you're looking for the best free authenticator app, you're in luck. Our summaries of the best authenticator apps, listed alphabetically, will help you decide which one to use so you can start setting up your accounts to be more secure. Enabling MFA is also one of the steps our team recommends to protect yourself from the consequences of a data breach, and it's among the steps you should take if you discover your information has already been involved in a breach. Using one of these apps can even help protect you against stealthy attacks like stalkerware. The security coverage team at PCMag frequently exhorts readers to use MFA.Īuthenticator apps, such as Authy, Google Authenticator, and Microsoft Authenticator, enable one of the more secure forms of it. Multi-factor authentication (MFA, also known as two-factor authentication or 2FA) adds another layer of protection. Leaks and hacks from recent years make it clear that passwords alone don't provide enough security to protect your online banking, social media logins, or even accounts for websites where you shop. ![]()
0 Comments
Leave a Reply. |