About 18,600 results
Open links in new tab
  1. Authy: Does multi-device mode imply that all keys are stored on …

    My understanding is that if you use Authy, without backups/multi-device options, none of your account keys are stored on their servers. It all resides on your single device. Ie, even if Authy …

  2. totp - How does Authy implement multi-device mode?

    Dec 14, 2020 · The accepted answer conflates Authy's multi-device mode with its cloud backup feature. I am specifically not asking about the cloud backup feature, but about the multi-device …

  3. multi factor - Is it safe to save a screenshot of my QR code ...

    Aug 15, 2019 · Authy also displays the remaining time before a token times out so that you can see if it is about to expire. I also take a screenshot of every QR code so that I can register it …

  4. Can I have push notification authentication without a third party …

    Apr 7, 2018 · Third-party authentication apps like Authy just simplifying this for you and usually, the user will use additional applications that require 2fa of a sort.

  5. Why is Authy (or TFA in general) considered more secure than just ...

    Sep 1, 2021 · Why is the use of Authy TFA more secure than just having a long password? Presumably the user will record his Authy code right along side his normal password. The net …

  6. Spooky behaviour with Authy - Information Security Stack Exchange

    Feb 26, 2017 · Both Authy and Google Authenticator will use exactly the same keys and generate exactly the same codes. They will get the current timestamp down to half-minutes, hash it with …

  7. multi factor - The Wrong Icon for NordVPN on Authy

    Sep 3, 2021 · I recently turned on the multi-factor authentication on NordVPN and I use Authy for the authenticator. After scanning the QR code on the website, I found that the icon displayed …

  8. authentication - How can Authy use Google Authenticator QR ...

    Jan 30, 2018 · I was just reading around and found it really fascinating that Authy can use Google Authenticator implementations anywhere. How does Authy does this? Isn't this a security risk?

  9. Authy 2FA best practices - Information Security Stack Exchange

    Sep 8, 2016 · Secondly, the Authy OTP seeds between each of these devices ARE DIFFERENT. Here is a side-by-side image of the Authy Desktop app and the Authy iPhone app. Notice the …

  10. multi factor - Information Security Stack Exchange

    Sep 3, 2020 · Google already implements it for both Android and iOS with Google Prompts, Authy already provides support for it also on both Android and iOS using Google's and Apple's push …