It is called two factor authentication for a reason! That's exactly the reason our administrators insisted of using a secondary device for 2FA. It is less secure if both are on the same device - even more if they are even in the same app! It may be more convenient, but it is less secure.I feel one of the advantages of a 2FA app is that if, for whatever reason, your password manager is compromised, the passwords still can't be used to log in to sites requiring 2FA.
In my case, if somehow Bitwarden was compromised (maybe someone saw me type in the password) then they'd still need my phone and to unlock it to use Authy.
It's for this reason I don't like the idea of both passwords and 2FA codes being in the same app, such as Apple's.
I am using Duo with Bitwarden. It's free for single user, at least it was free when I signed up. I like it, simple yes or no notification on my Apple Watch.I feel one of the advantages of a 2FA app is that if, for whatever reason, your password manager is compromised, the passwords still can't be used to log in to sites requiring 2FA.
In my case, if somehow Bitwarden was compromised (maybe someone saw me type in the password) then they'd still need my phone and to unlock it to use Authy.
It's for this reason I don't like the idea of both passwords and 2FA codes being in the same app, such as Apple's.
It is called two factor authentication for a reason! That's exactly the reason our administrators insisted of using a secondary device for 2FA. It is less secure if both are on the same device - even more if they are even in the same app! It may be more convenient, but it is less secure.
Exactly! It is like having the door lock de-icer in the glove compartment... 🤣Exactly. Also, if I decided to compromise my security and use Bitwarden to store my 2FA codes, how would I log into Bitwarden which requires a 2FA code? 🤔 😁
So I'd still need a separate app anyway.
SMS 2FA is better than no 2FA, but it's still not very secure. SIM jacking attacks, and the general lack of security with SMS means it's not great for protecting accounts. Time-based One Time Passwords (TOTP) based 2FA is much better, which is what this Proton app - and others like OTP Auth (what I use), Authy, MS Authenticator, Google Authenticator, and the 2FA built into password managers - do.Yes. SMS. When l use Safari to log into my accounts for: insurance, medical, payroll, retirement, FedEx, UPS, USPS, and others, I am sent a code via SMS.
Security aside, I'm thinking about the recovery hassle if I permanently lost access to my Apple account. Yep, it's convenient to have one Apple ID for email and saving passwords, but yikes, losing the ability to receive 2FA codes would make recovery even more difficult, so I'll definitely keep them separate.While it's convenient to have TOTP 2FA in your password manager app, it reduces security since if the password app is compromised, they then also have your 2FA as well.
Yep, the more secure something is, and the more you take on in the service of keeping your own security, the more you need to have your own backup plans.Security aside, I'm thinking about the recovery hassle if I permanently lost access to my Apple account. Yep, it's convenient to have one Apple ID for email and saving passwords, but yikes, losing the ability to receive 2FA codes would make recovery even more difficult, so I'll definitely keep them separate.
Some people need estate planners, I feel like I need a technology recovery planner.
...Also, the blog post immediately preceding this one is about Dropbox dropping theirs, so I am not confident in these “free” products.
Apple passwords does this too...
If you have all Apple devices, it will sync across them via iCloud without any account from Proton. Just set this up for my iPhone, iPad and MacBookPro. Works perfectly.It backs up to iCloud, but according to their FAQ you need to create an account to sync across devices.
View attachment 2533173
I also use 1Pasword 7. It seems to work under the beta of iOS 26 and MacOS Tahoe. Now that there is an authenticator application I don't have much of a need for 1Password 7. I'm also looking at bitwarden authenticator as well.I still use 1Password 7 for 2FA codes until it's not possible. Does anyone know if 1P 7 still works under iOS26/MacOS26?
Is this an issue for anyone? I use MS Authenticator and never once have I regretting "relying on Microsoft"...it works "whenever I need them" and to be honest, I trust a giant company like MS more than Proton.
When an entity has its own 2FA, it may disallow using 3rd-part 2FA. Case in point: Microsoft requiring Microsoft 2FA.What are the advantages and disadvantages of third-party 2FA when the entity already has its own 2FA? For example, I have 2FA enabled for my Amazon account. Why would I want to use a third party for that?
Yep, and they know it and this why they conveniently did not include 2FAS in the table they created to compare the Proton service to others.2FAS Auth is similar, without an account, open source and optional (iCloud) sync.