Twitter is one of the accounts, for me, if taken over, I will just create another account. I don’t use my main email account on any of these sites, since using an auth app is too much a hassle for basically a viewing site.
Hassle? Maybe it’s different outside the apple ecosystem but the venn circle for hassle doesn’t intersect anything in my iOS Keychain TOTP experience.
If I was a hacker this is exactly what I would write in a forum such as this hoping it might gain traction generally.
By giving the impression it’s hard to setup or use or not of greater security or utility some folks may not bother.
Because as a user of the iCloud Keychain’s built in TOTP authenticator I know that the switch from SMS to Keychain TOTP for a site takes <2 min and use during log in is as easy as pushing a button atop the keyboard to load the TOTP code into the login form.
When SMS 2FA became available years ago I went thru all my sites and added it. I periodically checked those that didn’t offer it and add where it becomes possible.
Since iCloud Keychain TOTP authenticator became available last year where possible, I upgraded all my previous SMS offering sites to TOTP and upgraded any 1FA sites now offering TOTP as well.
At the same time, I:
- (upgraded SMS to TOTP where available)
- (upgraded 1FA to TOTP where available)
- saved each site specific recovery key and one time codes in the Keychain’s notes section.
- removed my phone number. (This being a common static element that can be used to fingerprint a user).
- upgraded sites from a couple of common email addresses to unique Hide My Email iCloud addresses for EACH site (this is possible with iCloud+ for 0.99$/mo (also created a new gmail account to be used as the common inbox for all email being relayed through an iCloud address).
- where possible converted from a username for login authentication to the iCloud email address.
- upgraded 15-char site unique Keychain generated p/w’s to newer 20-character standard.
- where appropriate removed as much biographical info as possible, if non official used 6/6/66 as a common bogus birthday (if everybody did this it would further frustrate fingerprinting).
- for sites using them, I simplified all challenge questions according to a common standard and made a note of last word in question and the corresponding bogus answer. (Similarly, I noted any PIN or telephone passphrase in Keychain’s notes section).
- made notes in Keychain for the alias name I used on each site, what if any phone number, address, or birthday (real or bogus) is there.
- made a note of what credit card any site uses for recurring charges (as a general practice I never store card details except for recurring charges.)
- made a note in Keychain of 2FA status, so I can search it for biennial upgrade review, For example: 1FA, 2au (Keychain authenticator), 2ap (app based) 2sm, 3FA (available but not used bc not available where I live).
Now:
- I have a searchable overview of all logging authentication info and type, as well as any other security related info and biographical info.
- if I get spam via a unique iCloud email address, I know exactly where the site problem is and can go there and only there and quickly change e/m address, p/w, reset TOTP and RK or OTCs (as opposed to doing nothing because I’m not going to change anything on one let alone all 350 of my authentication records if I don’t know which site breached.)
- I can periodically review 2te or 1FA accounts for upgrade possibilities to 2au.
- I can soon abandon my old utility email addresses which have become spam receivers due to so many breaches over the years (I will keep these for a year, and monitor for any mail from any site I may have missed or which may have not implemented its new iCloud address properly; there were a couple that justified this after the fact.)
Of course it takes time to do all this but it compartmentalizes everything, and makes maintenance and breach repair supremely uniform and easy.
Take your time and peck away at it. It maybe took me a month or so to get thru all this. It may take you longer if you have not done any of these elements before. (Did on my iPhone while watching something Picture in Picture in corner.)
But in the end you will have peace of mind knowing you have the best possible security setup before a problem happens and a single cleanup to do should any breach become known to you (via spam, news, or contact from site.)