I personally am fine with this.

  • aplomBomb@midwest.social
    link
    fedilink
    English
    arrow-up
    121
    arrow-down
    3
    ·
    edit-2
    11 months ago

    Yep, should be standard everywhere

    … for accounts you actually give a shit about

    • ReversalHatchery@beehaw.org
      link
      fedilink
      arrow-up
      32
      arrow-down
      2
      ·
      11 months ago

      And not the twitch way, where you have to have in an identifier, your phone number, but using proper, standards ways for it, like TOTP and such

        • cwagner@lemmy.cwagner.me
          link
          fedilink
          arrow-up
          18
          arrow-down
          1
          ·
          11 months ago

          But you can only enable it, after you give them your phone number.

          Also, apparently years of subscribing to channels is not as verified as giving them your phone number. They should just say “We really want your phone number and don’t give a shit about anything else”.

          • moosetwin@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            11 months ago

            Before I deleted my accounts there, I remember twitter and facebook deactivated your account for “suspicious activity” if you did not provide a phone number when making it, and the only way to reactivate it was to give them your phone number.

          • SkaveRat@discuss.tchncs.de
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            11 months ago

            true. But I think that’s mostly to make bots harder to create. Not as easy to get a phone number than an email address

        • ReversalHatchery@beehaw.org
          link
          fedilink
          arrow-up
          5
          ·
          edit-2
          11 months ago

          As the other commenter said, only if you give them your phone number, and only through that garbage authy that does not use standard TOTP, but some proprietary crap, specifically made for twitch.

          And if you give them a phone number, which another user will also try to use in the future, then the secret used for TOTP can change in any moment, which means if you exported the secret to e.g. Aegis and deleted that tracking filled garbage that is named authy, at one point the codes just won’t work anymore, and you’re practically locked out. Apparently support should be able to help, but they don’t give a single fuck.

            • ReversalHatchery@beehaw.org
              link
              fedilink
              arrow-up
              2
              ·
              11 months ago

              How? How do you import the secret key to it? Are they finally showing a proper QR code when setting it up?

              My account is still locked to authy, and the support pages I have read are written as if it would still work through authy for everyone.

              • SkaveRat@discuss.tchncs.de
                link
                fedilink
                arrow-up
                2
                ·
                11 months ago

                Are they finally showing a proper QR code when setting it up?

                At least that was the case for me. I removed 2FA to make the authy key invalid and activated it again. and they do the normal TOTP setup stuff during setup

                • ReversalHatchery@beehaw.org
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  11 months ago

                  That sounds good. I still have a working login somehow, but unfortunately I can’t disable authy, because they want a code to do that, and they won’t accept those that I have, even though it was working when I have set it up.

            • ReversalHatchery@beehaw.org
              link
              fedilink
              arrow-up
              4
              ·
              11 months ago

              First of all, that they are totally unnecessary for twitch to be able to provide 2fa authentication.

              Other than that, their app has tracker components, all secret keys are stored in the cloud, who knows whether that’s encrypted, but on your phone’s storage surely not, if yours is rooted you can just view it in a file manager and copy it to a normal code generator app.
              Generally they support standard TOTP code generation, but for twitch they are using some weird shit that generates 8 long numbers (instead of the standard 6), of which the middle 2 is the same so they drop one of them, and then also codes expire in third the time as it is normally.

    • xhci@lemmy.ml
      link
      fedilink
      English
      arrow-up
      5
      ·
      11 months ago

      I foresee hardware tokens becoming more of a thing - also Passkeys (they’re so easy to use!). I do wonder if we’ll have more of a formal process to either backup or have “ownership” of our cloud accounts as they become even more intertwined with our lives.

      For example: iCloud Keychain is so easy to use, but what happens to your Passkeys if the account gets frozen? Currently, I don’t think there’s a way to extract the private keys (?).

      • NaN@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        11 months ago

        If your account is frozen they should still be on the device. That would be a good time to change all your passkeys over to a yubikey, or to add one as a secondary token.

        The keys being locked in a Secure Enclave is generally considered a feature, not a bug. That passkeys sync at all is somewhat concerning. I wouldn’t expect them to be exportable any time soon.

        • xhci@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 months ago

          How do Passkeys sync across devices on a single account?

          • NaN@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            11 months ago

            Apple actually describes the process for sync in some detail: https://support.apple.com/guide/security/secure-keychain-syncing-sec0a319b35f/web

            Apple also describes the keychain recovery process in depth (I think this is when you’ve lost all devices?): https://support.apple.com/guide/security/escrow-security-for-icloud-keychain-sec3e341e75d/1/web/1

            The Secure Enclave can apparently return the private key. For most keys it is encrypted with a key pair that is permanently stored in the Secure Enclave. For synchronized keys it is apparently encrypted with a key that is also stored in iCloud in such a way that Apple themselves cannot get to it.

            It does sound like they could potentially enable exporting the passkeys, I think it’s unlikely they would because they provide a method to move them to other devices already and it does introduce more avenues for misuse. I don’t think it’s a huge requirement anyway, most hardware tokens provide no way to export at all by design. Apps that use them for 2FA should provide for enrolling multiple tokens.

            • xhci@lemmy.ml
              link
              fedilink
              English
              arrow-up
              1
              ·
              11 months ago

              Wow - thanks for this. It’s really interesting! I had a feeling they were exporting the key since Passkeys “magically” migrate from device to device. I’m sure it’s using some token that they would be very hard pressed to divulge.

              I guess this rules out exporting the token, but to everyone else’s point, I think it’s still possible to access your on-device Passkeys without an iCloud account.

        • argv_minus_one@beehaw.org
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          11 months ago

          The use of a “secure enclave” for any purpose is a bug at best, because secure enclaves aren’t just secure against your adversaries; they’re also secure against you. This is intolerable. All machines must obey their owner, and “secure enclaves” by design don’t.

          • NaN@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 months ago

            Hard disagree. That rules out yubikey, smart cards, and most any other credential storage systems.