Privacy Guides
In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.
You can subscribe to this community from any Kbin or Lemmy instance:
Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!
Want to get involved? The website is open-source on GitHub, and your help would be appreciated!
This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.
Moderation Rules:
- We prefer posting about open-source software whenever possible.
- This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
- No soliciting engagement: Don't ask for upvotes, follows, etc.
- Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
- Be civil, no violence, hate speech. Assume people here are posting in good faith.
- Don't repost topics which have already been covered here.
- News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
- Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
- No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
- No misinformation: Extraordinary claims must be matched with evidence.
- Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
- General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.
Additional Resources:
- EFF: Surveillance Self-Defense
- Consumer Reports Security Planner
- Jonah Aragon (YouTube)
- r/Privacy
- Big Ass Data Broker Opt-Out List
I use Bitwarden (I know opinions are split when it comes to passwords and 2FA being in separate apps). But I like the convenience of it all being in one platform.
I also like Raivo, you can import/export them too.
You can set Bitwarden to require your master password for higher security logins. I keep a separate vault for work and personal things... Everything in my work vault requires it's master password to use them. The OTPs are useless without credentials, and you need the master password to get at those even when the vault is unlocked. YMMV but to me, this was "good enough" to ensure a separation of concerns between low and high risk.
I use bitwarden and only put totp codes in it for “low risk” uses. Like say…a Reddit account.
Thinks like email accounts or ones associated to bank etc I keep in google Authenticator (not synced to the cloud)
I also keep a spare phone with the google auth totp codes loaded in case I lose my phone.
At the service level I also keep backup codes or use a yubikey when possible. So even MFA at the account level often has options, even if it’s “my phone is across the room and I’m too lazy, backup code time”
I have been using this https://github.com/beemdevelopment/Aegis
Its great!
edit: I will add that 1password works well too. I use that for work
I'll second Aegis!
I also use Aegis, it has worked well. For backups I have it export automatically to a folder that is synced to a cloud file service.
I second aegis
For iOS I use Raivo. https://apps.apple.com/us/app/raivo-otp/id1459042137
Authy for OTP, Bitwarden for passwords.
As long as my provider shows some concern for the sensitivity of the data I entrust them with, I’m good.
I use Bitwarden for both passwords and TOTP. So much easier than messing around with multiple apps.
Yeah, that's my setup as well. Tech-savvy people tend to have an all-or-nothing attitude to security, but at the end of the day, as soon as you take some extra precautions like using a keygen or activating 2FA, you're already taking yourself out of the massive pool of targets of opportunity that hackers go for.
Same here, though I'm starting to move my OTP over to Bitwarden as well. Way more convenient - as a developer, I spend a lot of time off my phone. Makes more sense to let Bitwarden manage those so I don't have to pick up my phone as often.
I'm also slightly distrustful of closed-source Authy, whereas Bitwarden is open source and audited for security by third parties.
Aegis for OTP, Bitwarden with backups from the subscription for passwords.
I was on Authy, but painfully migrated to Aegis. I keep a backup on my NAS just in case.
I think Authy was the better app, and good with it working on my PC, but Aegis is more secure so that won.
Aegis is a good one for Android. I use the totp field in my keepassdx database that I open with a password (or fingerprint) and my yubikey to store my auth codes. I use this with syncthing running on a raspberry pi so it syncs the password database across my phone and all my computers.
Edit: initially said keepassXC I meant keepassdx for the mobile app. Xc is the desktop version.
I use Aegis, which automatically backs up with each change to the database to a folder that gets synced to a couple of different computers via syncthing.
For backup codes, I have a separate keypass database that's backed up to a couple of places. I thought about using Bitwarden for this backup, but having my 2FA backups in the same place as my passwords kinda defeated the point, IMO.
Anyway, this system has worked well for me.
I use andOTP but I didn't realize it wasn't in active development. I might give aegis a try. I have a yubikey and once I get a second one I may move everything to that.
I switched from andOTP to Aegis when I found out about the development and I actually like it more! I was able to import all my saved credentials easily.
I use Vaultwarden server with the Bitwarden app for all passwords and 2fa keys in one app
Yubico Authenticator and Aegis depending on the importance of the account. I have a secondary Yubikey for quick access backups and a keepass database exclusively for my TOTP keys that I backup to my nextcloud server in real time with versioning. Similarly, I backup my Aegis backups with the nextcloud app.
2FAS, because it's fucking beautiful (UI, dark mode, lovely site logos). It has a couple backup options. Also using Bitwarden (paid feature) for less important sites; it's quicker but I prefer my 2FA truly separate from passwords.
https://github.com/dani-garcia/vaultwarden with the official Bitwarden App/Firefox extension
I use andOTP, but will soon be switching to Aegis as andOTP is no longer updated.
Another vote for bitwarden. They have self host options. I use vaultwarden to self host it.
I use Aegis for important apps and store all non-critical ones in vaultwarden. It's a good trade-off in my opinion of having the convenience for less important things but still be secure and not having a single point of compromise for my critical, sensitive apps.
Aegis on my phone and also Keepassxc on desktop.
iOS now lets you authenticate from within the OS. This is super convenient in the Apple ecosystem, though I’m not sure if it’s the best for security. I do keep my iCloud now fully encrypted.
Yubico Authenticator + nfc yubikeys
Only downside with Yubikeys is that you can't really have backups. The solution is to have two of them, and add the 2FAs to each of them every time you sign up for a new account. It does mean you pretty much can't have offsite backups though.
Personally I keep a USB-A with NFC one on my keyring and then a UISB-C one at my desk, which covers every device I have.
Raivo OTP for iOS. Open-source and allows easy exporting for backup or migration. I previously felt stuck on Authy but used Raivo's migration guide.
I was going to mention this as well. I went from Google, to Authy, to Raivo OTP and never looked back. Their sync system is great too.
They have a website too with more articles as well https://raivo-otp.com/
Another upvote for Raivo!
Freeotp+
Keepassxc Database with keepassxcxc and yubikey :)
The Moment i learned that i can use totp with keepassxc killed aeges for me :)
I've started using Ente Auth, I like it's design and how it shows you the "next" code in case the current one is about to expire. It's on F-Droid
I usually just use KeePassXC, which is open source and self hosted (kinda). It's synced over onedrive, though something like syncthing would work fine too.
No backups per-se, but onedrive should handle accidentally deleted files, and the database is on a few machines anyway so the chances of anything permanently happening to all copies are rather slim.
I use keepass (yes, i am fully aware having the password and second factor together is bad). The only defense i have is that my database is never uploaded to the cloud and is synced either via flash drive or syncthing. Also my master password is over 20 characters with lower, capital, numbers, and symbols.
I use Microsoft Authenticator. I hadn't looked into open source options at the time when I needed one and it was the most immediately apparent alternative to the Google Authenticator on the Play Store.