ruby.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
If you are interested in the Ruby programming language, come join us! Tell us about yourself when signing up. If you just want to join Mastodon, another server will be a better place for you.

Administered by:

Server stats:

1.1K
active users

@atpfm in the discussion of google auth and syncing, there was an implication by John that Keychain can perform 2FA. I’ve seen others say 1password can as well, but how is that a second factor? Doesn’t it turn a second factor into a first since access to your computer and keychain means passwords + 2FA? i.e. shouldn’t 2FA be kept as a separate factor on an iphone or other device? Or am I missing something about how all this works?

Sebastian Cohnen

@davetron5000 @atpfm This is all „just“ 2-step, not two-factor. In case of 1PW for example it’s two times something you know, so twice the same factor (knowledge).

This can still be valuable, in case your credential entry gets intercepted for example. Depends on your thread model if you need 2FA or not.

@tisba @davetron5000 @atpfm

In addition, it's a good idea to have 2FA also for unlocking 1Password.
As said, I think a lot depends on the threat model, but (for 1P) to get access to its passwords + OTPs you need to have already access to the master password + second factor.
So moving all your OTPs on the phone would make no difference, in many cases.