-
130 votes
-
Google Authenticator now supports Google Account synchronization
After 11 years of life, Google Authenticator has added cloud backups for OTP keys in version 6.0. Google Security Blog: Google Authenticator now supports Google Account synchronization This is...
After 11 years of life, Google Authenticator has added cloud backups for OTP keys in version 6.0.
Google Security Blog: Google Authenticator now supports Google Account synchronization
This is surprising news to me, because historically Authenticator had no way to backup keys by design. Here's a 2017 quote from a Google engineer who maintains Authenticator:
There is by design NO account backups in any of the apps. [source]
This design choice always made sense to me, as the point of 2FA is that you've got (1) something you know, and (2) something you have. The second factor should be tied to a physical device. If you lose the physical device, the second factor should be gone, and you'll need to use one of those 10-ish backup codes that we all definitely keep somewhere safe. I'm quite befuddled that Google is reversing this design choice and walking back their previously strong, security-centric design for the sake of user convenience in the case of a lost phone. I used to advise my friends and family to choose Google Authenticator over Authy for this specific reason.
If you want further reading, here's a PCWorld article with an altogether different tone than Google's announcement: Google Authenticator’s long-awaited cloud 2FA feature carries hidden risk
11 votes -
Should I be using a passkey?
I saw all the hype about Google's new passkey rollout on Hacker News and Ars Technica in the past month, and have even read an article stating that, paraphrased, "I should start using passkeys...
I saw all the hype about Google's new passkey rollout on Hacker News and Ars Technica in the past month, and have even read an article stating that, paraphrased, "I should start using passkeys immediately, even if the tech is not all the way there yet."
Some questions:
- Are you using passkeys currently? Which provider?
- Is there a fear of vendor lock-in (looking at you, Apple) or ditching the product in the future (looking at you, Google)?
- Any other concerns I should be aware of, e.g. what happens if my phone gets run over by a bulldozer?
25 votes -
Amazon Ring cameras were used to spy on customers
32 votes -
KeePass 2.54 is out
8 votes -
1Password releases Passkeys in public beta channels
12 votes -
Stop silly security awards
6 votes -
$100 million gone in twenty-seven minutes
6 votes -
Generate a secure password using lyrics from Kenny Loggins. It's funny and useful!
4 votes -
Google released a .zip web domain and people can't decide if it's the phishing apocalypse or just as bad as any other dodgy link
13 votes -
"SHA-1 is a Shambles" - A demonstration of a chosen-prefix collision for SHA-1 (2020)
5 votes -
SolarWinds: The untold story of the boldest supply-chain hack ever
7 votes -
Google's adoption of passkeys (security blog article)
11 votes -
NSO group’s Pegasus spyware returns in 2022 with a trio of iOS 15 and iOS 16 zero-click exploit chains
4 votes -
Upgrade your LUKS key derivation function
7 votes -
Prompt injection: What’s the worst that can happen?
8 votes -
Norway has expelled fifteen Russian officials that it had accused of spying under diplomatic cover
8 votes -
Samsung meeting notes and new source code are now in the wild after being leaked in ChatGPT
5 votes -
Talkback: An aggregator of security news, articles and posts
5 votes -
AI can fool voice recognition used to verify identity by Centrelink and Australian tax office
11 votes -
A flock of chickens, held for ransom — Growing cyberattacks on Canada's food system threaten disaster
9 votes -
Monitor and respond to security alerts from within Minecraft
7 votes -
Belgium launches nationwide safe harbor for ethical hackers
10 votes -
LockPickingLawyer (literally) slaps open a MojoBox digital lockbox
22 votes -
Danish parliament urges lawmakers and employees to remove TikTok on work phones as a cybersecurity measure, saying “there is a risk of espionage”
4 votes -
Reddit was hacked
16 votes -
SolarWinds and market incentives
8 votes -
Upgraded to Windows 10, what do I need to do to optimize?
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some...
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some unneeded services. What else can I do to keep her computer fast? Particularly interesting in more services I can disable and the best browser/ad blocker combo. Thanks y’all!
10 votes -
What we learned from building GovSlack
6 votes -
Anker finally comes clean about its Eufy security cameras
23 votes -
US airline accidentally exposes ‘No Fly List’ on unsecured server
17 votes -
Mystery divers rescued near Polish energy sites in the middle of the night offer dubious explanation, and vanish
12 votes -
Three lessons from Threema: Analysis of a secure messenger
7 votes -
Comcast Xfinity accounts hacked in widespread 2FA bypass attacks
9 votes -
Anker’s Eufy lied to us about the security of its security cameras. Despite claims of only using local storage, Eufy has been uploading identifiable footage to the cloud.
18 votes -
Getting started with nmap
3 votes -
SSH server hardening
5 votes -
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices. CryWiper masquerades as ransomware, but its real purpose is to permanently destroy data.
12 votes -
LastPass recent security incident
7 votes -
One-Time Programs
10 votes -
Twitter’s SMS two-factor authentication is melting down
21 votes -
Two brothers have been charged in Sweden with spying for Russia over a period of ten years
7 votes -
Twitter thread on a drone-delivered network exploit
10 votes -
Russia's war in Ukraine has forever changed Europe's energy landscape – Norway finds itself at the forefront of an energy crisis
4 votes -
Revealed: US Military bought mass monitoring tool that includes internet browsing, email data
11 votes -
During his testimony before the Senate Judiciary Committee, Peiter "Mudge" Zatko claims Twitter only has live production environment that all engineers can access
@Benjamin Powers: Mudge walking through Twitter's construction - they only have live production environment, no test environment.
17 votes -
Prompt injection attacks against GPT-3
14 votes -
Bitwarden raises $100 million from PSG Equity
12 votes -
Cloudflare blocks Kiwi Farms
36 votes -
The secret life of SIM cards (DEFCON 21)
7 votes