36

One more step to unhitching from Google...

Right now the only option I see in F-Droid is Aegis.

I'm not sure what to actually look for side from checking for unexpected permissions and reasonably frequent updates.

Hopefully something I can sync with a GNOME app...

top 50 comments
sorted by: hot top controversial new old
[-] pipe01@programming.dev 32 points 3 weeks ago

I use Aegis, it works well

[-] deathbird@mander.xyz 26 points 3 weeks ago

I like Aegis.

[-] salacious_coaster@infosec.pub 22 points 3 weeks ago

Bitwarden. I don't self host it, though. $10 a year for password management and 2FA is fine by me.

[-] cmnybo@discuss.tchncs.de 18 points 3 weeks ago

I've been using KeePassXC. I use Syncthing to keep the database synchronized between computers.

[-] synestine@sh.itjust.works 5 points 3 weeks ago

Same here. If it's TOTP based 2fa, you can keep them in entries and use them from there.

[-] 30p87@feddit.org 5 points 3 weeks ago* (last edited 3 weeks ago)

Tbh, if you're using the same DB for PWs, you've successfully downgraded to 1FA now. Except maybe if you use a seperate KeyStick/Yubikey as secret bearer or smth

[-] hikaru755@lemmy.world 2 points 3 weeks ago

More like 1.5FA, at least. It still protects against passwords being compromised in any way that doesn't compromise full access to your password database, which is still a lot better than using just passwords without a second factor.

[-] example@reddthat.com 1 points 3 weeks ago

that's like calling strong randomly generated passwords 1.5FA.

with proper MFA, even if you steal my password (database), you won't be able to steal my account, as you're missing the second factor. with classic otp this is just a single use number you enter on the potentially compromised system, but if you get the seed (secret) stolen, valid numbers can be generated continuously.

password managers (should) protect against reuse. MFA protects against logins on untrusted and potentially compromised systems/keyloggers if they're not extracted live. password managers with auto fill and phishing resistant MFA can prevent phising, although the password manager variant is still easily bypassed when the user isn't paying enough attention, as it's not even that uncommon for login domains to change. obviously there are also other risks on compromised devices, like session cookie exfiltration, and there is a lot of bullshit info around from websites, especially the ones harvesting phone numbers while claiming to require it for 2FA just to gaslight users.

[-] fubarx@lemmy.world 12 points 3 weeks ago
[-] poccalyps@sh.itjust.works 7 points 3 weeks ago
[-] chillpanzee@lemmy.ml 1 points 3 weeks ago

Been using it for a while. It's pretty awesome.

[-] Cyberflunk@lemmy.world 6 points 3 weeks ago
[-] BingBong@sh.itjust.works 2 points 3 weeks ago

Definitely this, especially if you'll be sharing with a non techie. My wife was able to pick 1password up and use it immediately and she normally turns her nose up at any of my recommendations.

For the 1password accounts 2FA, use a yubikey or aegis. Everything else to 1 password.

[-] AMillionMonkeys@lemmy.world 5 points 3 weeks ago

Bitwarden Authenticator because Bitwarden seems to have a good reputation. I don't use their password manager, though.
It does seem faintly insecure that it displays all of the codes at once on one page, but I'm having trouble imagining a scenario where it's actually a problem.

[-] gagootron@feddit.org 5 points 3 weeks ago

Yubikey. I dont want to trust my phone, so I use some separate hardware instead

[-] solrize@lemmy.ml 4 points 3 weeks ago* (last edited 3 weeks ago)

I'm currently using FreeOTP from F-droid. Aegis seemed to have way too much extra crap. You don't want to sync multiple 2fa applications together since the idea of the 2nd factor is it's only in one place. Even being able to back it up is sort of contra, but if you have to, make sure the backup is well safeguarded.

The basic TOTP algorithm is quite easy to implement fwiw. A dozen or so lines of Python.

[-] nullpotential@lemmy.dbzer0.com 4 points 3 weeks ago
[-] example@reddthat.com 3 points 3 weeks ago

FreeOTP/FreeOTP+

depending on your goal for this (real 2fa vs just simulated) you shouldn't have sync in the first place.

you could also look into security keys (hardware solution, webauthn/FIDO2) as an alternative that has strong security with good user experience (no typing anymore), but they're not as widely accepted.

[-] arox@lemmy.frozeninferno.xyz 3 points 3 weeks ago

What you mean syncing with Gnome app?

[-] Undaunted@feddit.org 2 points 3 weeks ago

Yubikeys. I have 2 of them and both have the same entries in case one breaks.

[-] bitwolf@sh.itjust.works 2 points 3 weeks ago
[-] ayyo@sh.itjust.works 2 points 3 weeks ago

I used aegis for a long time, switched to protons after they introduced it. Ideally I'd be using something physical though like a yubikey

[-] ceiphas@piefed.social 2 points 3 weeks ago

i use Mauth

IIRC it can sync by storing the Data in a file you can sync with a tool of your choice

[-] spacelord@sh.itjust.works 2 points 3 weeks ago

Aegis ♥️

[-] lka1988@lemmy.dbzer0.com 2 points 3 weeks ago

I use Aegis, automatically backed up every time a new key is added. Was using Authy for a while, but they're going down the enshittification hole, so I dumped them.

[-] zingo@sh.itjust.works 2 points 3 weeks ago

Aegis.

I like the auto backup feature (encrypted) . Then the backup is synced to computer via Syncthing.

Set and forget setup.

[-] Appoxo@lemmy.dbzer0.com 2 points 3 weeks ago
[-] ohshit604@sh.itjust.works 1 points 3 weeks ago* (last edited 3 weeks ago)

Yubikey for 2Fa codes also works well for sudo and su (2Fa) or if you still use Windows I think it supports single sign on there. Absolutely worth the purchase have had my keys for years.

[-] mhzawadi@lemmy.horwood.cloud 1 points 3 weeks ago

We use yubikeys at work, far better then an OTP. Also I have 2 for home use, the only issue is I need to put 1 on some keys I carry as I sometimes need 1 and don't have it.

[-] 5ymm3trY@discuss.tchncs.de 1 points 3 weeks ago

Can you explain a little more how you handle them in your daily life? I always liked the idea if Yubikeys, but I am a bit worried that I just would switch back to my phone (Aegis) for convenience. Things like:

Are there accounts that you didn't get to work? Do you have separate keys for personal and work accounts? Do you just have it on your keychain an plug it in whenever you need it? Because always plugged in keys in your phone or laptop doesn't really make sense. As far as I know you can't just clone a key. How easy is it to setup a backup key? Does this work for all accounts? I try to not use my phone for critical stuff, but there are times I have to just check an account. Do you use your phone with Yubikeys? How is your experience? USB or NFC?

[-] ohshit604@sh.itjust.works 2 points 3 weeks ago

Can you explain a little more how you handle them in your daily life? I always liked the idea if Yubikeys, but I am a bit worried that I just would switch back to my phone (Aegis) for convenience.

I have two Yubikey 5 NFC’s, one I keep majority of my 2Fa auth codes on and keep on my keychain the other I leave at home mainly for backup 2Fa setups or desktop/WebAUTH/Single Sign-On logins, most websites won’t let you setup 2 2Fa keys so the second one mostly handles the plug-in and touch key portion of my setup.

Are they inconvenient? Yes, the amount of times where I got annoyed because I’ve had to grab my keychain to sign in has gotten annoying but not enough to switch back to online providers. I prioritized security over convenience in this circumstance. The Yubikey that I keep on my keychain also handles my work 2Fa codes, doesn’t feel necessary to have a dedicated key for that unless my company is willing to pay for it.

Do you just have it on your keychain a plug it in whenever you need it? Because always plugged in keys in your phone or laptop doesn't really make sense.

It actually works out quite nice having it plugged in all the time, especially if you’re doing multiple 2Fa authentications, the keys won’t authenticate until you enter the password of the key (if you set one up) and touch the key, so even if your computer is compromised they still need to physically touch the key to generate the authentication codes.

As far as I know you can't just clone a key.

So no you cannot clone a Yubikey to another Yubikey, which I think is dumb, but they have their security reasoning behind it I believe. Like I mentioned earlier all my 2Fa codes/keys are on my keychain so if I break that key I am in a horrible position as I lose access to a lot of accounts that I couldn’t setup multiple 2Fa’s for.

How easy is it to setup a backup key?

While Yubico does recommend having two keys as I mentioned certain services only let you setup 2Fa once and not multiple times. However, Linux (and I want to assume Windows as well) let you setup as many 2Fa keys as you want, so both the Yubikey on my keychain and the one I leave at home both grant Root access to my desktop and server.

I try to not use my phone for critical stuff, but there are times I have to just check an account. Do you use your phone with Yubikeys?

So I don’t have a USB C Yubikey ironically both my iPhone and iPad are USB C so I have the option to use a dongle or NFC, both have worked great, I have had a couple scares where the app will error and say “No response from key” but it seems that error is due to bad contact/connection. I’ve attached a few images of the iOS app to help get an idea of the layout.

Once you open the app

Swipe down to scan for NFC

After scanning key it shows you your accounts

Click on your desired account

Click calculate and scan your key again

[-] retro@infosec.pub 1 points 3 weeks ago

Proton Authenticator. Has both Desktop and Mobile apps. Free. Don't have to sync to Proton.

[-] hanrahan@slrpnk.net 0 points 3 weeks ago

Do they have a Linux client for the desktop?

[-] retro@infosec.pub 1 points 3 weeks ago

deb, rpm and aur-bin

[-] mhzawadi@lemmy.horwood.cloud 1 points 3 weeks ago

I use freeotp+, but it looks like it could be dead now. But I does have an export to file.

[-] Curious_Canid@lemmy.ca 1 points 3 weeks ago

I've been using Aegis for several years now without any problems. It replaced the Google Authenticator seamlessly.

[-] asudox@lemmy.asudox.dev 1 points 3 weeks ago

I use Aegis on my phone.

[-] Unlearned9545@lemmy.world 1 points 3 weeks ago
load more comments (3 replies)
[-] W4nd3r3r@lemmy.ml 1 points 3 weeks ago
[-] vrighter@discuss.tchncs.de 1 points 3 weeks ago

keepassxc and a yubikey. And syncthing to keep all devices in sync

[-] nickiam2@aussie.zone 1 points 3 weeks ago

Yubikey. It supports TOTP as well as passkeys. Plus is a physical device separate from my phone. Recommend getting 2 to have 1 as backup

[-] MrSulu@lemmy.ml 1 points 3 weeks ago
[-] erev@lemmy.world 1 points 3 weeks ago

Bitwarden as Vaultwarden enables TOTP.

load more comments
view more: next ›
this post was submitted on 13 Oct 2025
36 points (97.4% liked)

Selfhosted

52779 readers
77 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS