About 50 results
Open links in new tab
  1. Authy - is my backup secured by only my password or 2FA s well

    Aug 22, 2016 · I've read around the Authy site and done a few Google searches, but it is not clear to me whether an attacker that compromised my Authy account backup password could access my keys …

  2. Spooky behaviour with Authy - Information Security Stack Exchange

    Feb 26, 2017 · Both Authy and Google Authenticator will use exactly the same keys and generate exactly the same codes. They will get the current timestamp down to half-minutes, hash it with your …

  3. multi factor - The Wrong Icon for NordVPN on Authy - Information ...

    Sep 3, 2021 · I recently turned on the multi-factor authentication on NordVPN and I use Authy for the authenticator. After scanning the QR code on the website, I found that the icon displayed in the …

  4. Authy 2FA best practices - Information Security Stack Exchange

    Sep 8, 2016 · Secondly, the Authy OTP seeds between each of these devices ARE DIFFERENT. Here is a side-by-side image of the Authy Desktop app and the Authy iPhone app. Notice the values are …

  5. authentication - Authy backup password issue - Information Security ...

    Apr 21, 2017 · I have enabled Authy backups on my phone, and set the password. Then I installed the Chrome app on my PC, after I input backup password, the screen shows "Re-encrypting accounts". …

  6. totp - How does Authy implement multi-device mode? - Information ...

    Dec 14, 2020 · The accepted answer conflates Authy's multi-device mode with its cloud backup feature. I am specifically not asking about the cloud backup feature, but about the multi-device mode which is …

  7. Authy: Does multi-device mode imply that all keys are stored on their ...

    My understanding is that if you use Authy, without backups/multi-device options, none of your account keys are stored on their servers. It all resides on your single device. Ie, even if Authy se...

  8. How does Authy's 2FA work, if it doesn't connect to the server?

    In Authy's case, when the user submits a passcode to the server, the server looks up the user's seed data, calculates the counter value based on the timestamp of the request and then generates the …

  9. Authy reviewed? - Information Security Stack Exchange

    Aug 9, 2018 · Authy looks like a great solution - especially for laymen, in order to simplify complexities - but I have some nagging concerns re privacy & security, especially when sensitive data is …

  10. Why is Authy (or TFA in general) considered more secure than just ...

    Sep 1, 2021 · Why is the use of Authy TFA more secure than just having a long password? Presumably the user will record his Authy code right along side his normal password. The net result being that …