social.anoxinon.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Die offizielle Mastodon Instanz des Vereins Anoxinon e.V.

Serverstatistik:

1,2 Tsd.
aktive Profile

#2fa

6 Beiträge6 Beteiligte0 Beiträge heute
N-gated Hacker News<p>🚨 Stop the presses! 🚨 A <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> app that alerts you when you hit the oh-so-crucial "314159" – because nothing screams "cutting-edge security" like a Pi surprise party for nerds. 🤦‍♂️ Keep subscribing to this riveting newsletter for your fill of code-speak and retro nostalgia. 📈🎉<br><a href="https://blog.jacobstechtavern.com/p/building-a-2fa-app-that-detects-patterns" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.jacobstechtavern.com/p/bu</span><span class="invisible">ilding-a-2fa-app-that-detects-patterns</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/PiDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PiDay</span></a> <a href="https://mastodon.social/tags/NerdCulture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NerdCulture</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/RetroNostalgia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RetroNostalgia</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
🌻<p>Meine Datenschutz und Privatsphäre Übersicht 2025, für die Allgemeinheit 🕵️‍♂️ </p><p>Teilen er­be­ten ‼️ :BoostOK: </p><p><a href="https://cryptpad.digitalcourage.de/file/#/2/file/C3-dKGz23Qhw1ZSBmDnOAK3s/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptpad.digitalcourage.de/fil</span><span class="invisible">e/#/2/file/C3-dKGz23Qhw1ZSBmDnOAK3s/</span></a></p><p>&nbsp;<a href="https://digitalcourage.social/tags/DSGVO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DSGVO</span></a> <a href="https://digitalcourage.social/tags/TDDDG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TDDDG</span></a> ( <a href="https://digitalcourage.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a> )<br><a href="https://digitalcourage.social/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://digitalcourage.social/tags/Privatsph%C3%A4re" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privatsphäre</span></a> <a href="https://digitalcourage.social/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://digitalcourage.social/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <br><a href="https://digitalcourage.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://digitalcourage.social/tags/WEtell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WEtell</span></a> <a href="https://digitalcourage.social/tags/SoloKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoloKey</span></a> <a href="https://digitalcourage.social/tags/NitroKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NitroKey</span></a> <a href="https://digitalcourage.social/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://digitalcourage.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://digitalcourage.social/tags/Pixelfed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pixelfed</span></a> <a href="https://digitalcourage.social/tags/Massen%C5%B1berwachung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Massenűberwachung</span></a> <br><a href="https://digitalcourage.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://digitalcourage.social/tags/Metadaten" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Metadaten</span></a> <a href="https://digitalcourage.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://digitalcourage.social/tags/Threema" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Threema</span></a> <a href="https://digitalcourage.social/tags/Cryptpad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptpad</span></a> <a href="https://digitalcourage.social/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a><br><a href="https://digitalcourage.social/tags/Hateaid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hateaid</span></a> <a href="https://digitalcourage.social/tags/Cyberstalking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberstalking</span></a> <a href="https://digitalcourage.social/tags/Messenger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Messenger</span></a> <a href="https://digitalcourage.social/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a> <a href="https://digitalcourage.social/tags/Youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Youtube</span></a> <a href="https://digitalcourage.social/tags/NewPipe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NewPipe</span></a> <a href="https://digitalcourage.social/tags/Chatkontrolle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chatkontrolle</span></a> <a href="https://digitalcourage.social/tags/nichtszuverbergen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nichtszuverbergen</span></a> <a href="https://digitalcourage.social/tags/%C3%9CberwachungsKapitalismus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ÜberwachungsKapitalismus</span></a> <a href="https://digitalcourage.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://digitalcourage.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://digitalcourage.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://digitalcourage.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://digitalcourage.social/tags/Matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Matrix</span></a> <a href="https://digitalcourage.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> <a href="https://digitalcourage.social/tags/Friendica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Friendica</span></a> <a href="https://digitalcourage.social/tags/Fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a> <a href="https://digitalcourage.social/tags/Mastodir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodir</span></a> <a href="https://digitalcourage.social/tags/Loops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Loops</span></a> <a href="https://digitalcourage.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> <a href="https://digitalcourage.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://digitalcourage.social/tags/Foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Foss</span></a> <a href="https://digitalcourage.social/tags/VeraCrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VeraCrypt</span></a> <a href="https://digitalcourage.social/tags/HateAid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HateAid</span></a> <a href="https://digitalcourage.social/tags/Coreboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Coreboot</span></a> <a href="https://digitalcourage.social/tags/Volksverpetzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Volksverpetzer</span></a> <a href="https://digitalcourage.social/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzpolitik</span></a> <a href="https://digitalcourage.social/tags/Digitalisierung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Digitalisierung</span></a> <a href="https://digitalcourage.social/tags/FragdenStaat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FragdenStaat</span></a> <a href="https://digitalcourage.social/tags/Shiftphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shiftphone</span></a>&nbsp;&nbsp;<a href="https://digitalcourage.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://digitalcourage.social/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GrapheneOS</span></a> <a href="https://digitalcourage.social/tags/CCC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CCC</span></a> <a href="https://digitalcourage.social/tags/Mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mail</span></a> <a href="https://digitalcourage.social/tags/Mullvad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mullvad</span></a> <a href="https://digitalcourage.social/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a> <a href="https://digitalcourage.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GnuPG</span></a> <a href="https://digitalcourage.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://digitalcourage.social/tags/Gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gaming</span></a> <a href="https://digitalcourage.social/tags/linuxgaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxgaming</span></a> <a href="https://digitalcourage.social/tags/Lutris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lutris</span></a> <a href="https://digitalcourage.social/tags/Protondb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Protondb</span></a> <a href="https://digitalcourage.social/tags/eOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eOS</span></a> <a href="https://digitalcourage.social/tags/Enshittification" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Enshittification</span></a> <br><a href="https://digitalcourage.social/tags/Bloatware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bloatware</span></a> <a href="https://digitalcourage.social/tags/TPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPM</span></a> <a href="https://digitalcourage.social/tags/Murena" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Murena</span></a>&nbsp;&nbsp;<a href="https://digitalcourage.social/tags/LiberaPay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LiberaPay</span></a> <a href="https://digitalcourage.social/tags/GnuTaler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GnuTaler</span></a> <a href="https://digitalcourage.social/tags/Taler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Taler</span></a> <a href="https://digitalcourage.social/tags/PreppingforFuture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PreppingforFuture</span></a><br><a href="https://digitalcourage.social/tags/FediLZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediLZ</span></a> <a href="https://digitalcourage.social/tags/BlueLZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueLZ</span></a> <a href="https://digitalcourage.social/tags/InstaLZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InstaLZ</span></a> <a href="https://digitalcourage.social/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModel</span></a><br><a href="https://digitalcourage.social/tags/FLOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FLOSS</span></a> <a href="https://digitalcourage.social/tags/UEFI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEFI</span></a> <a href="https://digitalcourage.social/tags/Medienkompetenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Medienkompetenz</span></a></p>
Paul Kater<p><a href="https://nlpagan.net/password-and-mfa2fa.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlpagan.net/password-and-mfa2f</span><span class="invisible">a.html</span></a></p><p>More on security, getting European options and such.</p><p><span class="h-card" translate="no"><a href="https://social.vivaldi.net/@ueeu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ueeu</span></a></span></p><p><a href="https://writing.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://writing.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> <a href="https://writing.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>
Wren :HeartQueer:<p>Riddle me this. If I was to do an experiment where I did a landline for a month with no cellphone, how would I offload Microsoft's 2FA auth app I need for work? Can it safely be emulated on a virtual device on a Linux host?</p><p>Man if there was ever a use case for iPod touch to come back. I wonder if there is a current Android equivalent? </p><p><a href="https://kind.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://kind.social/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://kind.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>
Nick<p>I'm often disappointed by how poor the <a href="https://mathstodon.xyz/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> is on the websites of financial institutions, many still offering only SMS <a href="https://mathstodon.xyz/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> or no 2FA at all. But a small number are better and offer at TOTP or even FIDO. Does anyone actually try to track which institutions offer what? This would definitely be a factor for me in the future choices (if I could get this information).</p><p><a href="https://mathstodon.xyz/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Tommaso Gagliardoni<p>I am looking for a reliable mail hosting provider, with 2FA, unlimited aliases (including catch-all * ), POP+SMTP+IMAP, no mobile app required, with configurable domain but not bundled to the provider being the registrar. Possibly based in EU/Switzerland.</p><p>Discarded options:<br>- I am moving away from Gandi.<br>- Infomaniak seems to require registering domain with them.<br>- Zoho based in UK.<br>- MXroute does not seem to offer 2FA.<br>- Autistici/Inventati only with one of their domains (not configurable).<br>- Fastmail based in Australia.<br>- Mailcheap based in USA.</p><p>Thankful for any suggestions 😀 </p><p><a href="https://infosec.exchange/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://infosec.exchange/tags/hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosting</span></a> <a href="https://infosec.exchange/tags/gandi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gandi</span></a> <a href="https://infosec.exchange/tags/eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eu</span></a> <a href="https://infosec.exchange/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a> <a href="https://infosec.exchange/tags/zoho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zoho</span></a> <a href="https://infosec.exchange/tags/infomaniak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infomaniak</span></a> <a href="https://infosec.exchange/tags/mailcheap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailcheap</span></a> <a href="https://infosec.exchange/tags/mxroute" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mxroute</span></a> <a href="https://infosec.exchange/tags/fastmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fastmail</span></a> <a href="https://infosec.exchange/tags/AutisticiInventati" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutisticiInventati</span></a></p>
(Des)aponta e Clica<p>Atualmente uso o <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> authenticator para MFA/2FA. Quero mudar para uma opção segura e <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a>. Que funcione tanto em mobile quanto no desktop ( <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> e <a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> ) Sugestões?</p><p>Uso o navegador <a href="https://mastodon.social/tags/floorp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>floorp</span></a> ( <a href="https://mastodon.social/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> )</p><p>Currently using <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> authenticator for MFA/2FA. I want to change to a secure and <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> option. It should work both on mobile and desktop ( <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> and <a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> ) Suggestions?</p><p>If suggestion is a browser extension I'm using <a href="https://mastodon.social/tags/floorp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>floorp</span></a> ( <a href="https://mastodon.social/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> fork )</p><p><a href="https://mastodon.social/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>
scrap//code :corteximplant:<p>I am looking for a <a href="https://corteximplant.com/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> or at least <a href="https://corteximplant.com/tags/eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eu</span></a> or <a href="https://corteximplant.com/tags/efta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>efta</span></a> based <a href="https://corteximplant.com/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a> <a href="https://corteximplant.com/tags/authenticator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authenticator</span></a> app that is available for <a href="https://corteximplant.com/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> to migrage away from the <a href="https://corteximplant.com/tags/techbro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>techbro</span></a> authenticator I am currently using. My first investigation brought up 2FAS. Is this a recommended piece of software? Any alternatives?<br>---<br><a href="https://corteximplant.com/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a></p>
Pierre-Yves Lapersonne<p>Good :blobcatcoffee: </p><p><a href="https://framapiaf.org/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://framapiaf.org/tags/iosdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosdev</span></a> <a href="https://framapiaf.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://framapiaf.org/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> <a href="https://framapiaf.org/tags/a11y" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>a11y</span></a> <a href="https://framapiaf.org/tags/VoiceOver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoiceOver</span></a></p>
JP Mens<p>A look at <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> hosting with <a href="https://mastodon.social/tags/deSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deSEC</span></a></p><p>deSEC is free of charge to use, supports <a href="https://mastodon.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>, <a href="https://mastodon.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>, REST API, <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> with <a href="https://mastodon.social/tags/TOTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TOTP</span></a> tokens, and dynDNS integration among others.</p><p><a href="https://jpmens.net/2025/03/04/a-look-at-domain-hosting-with-desec/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jpmens.net/2025/03/04/a-look-a</span><span class="invisible">t-domain-hosting-with-desec/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a> Security—<a href="https://mastodon.thenewoil.org/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> Codes To Be Replaced By Single-Step Login</p><p><a href="https://www.forbes.com/sites/daveywinder/2025/03/01/paypal-security-2fa-codes-to-be-replaced-by-single-step-login/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">025/03/01/paypal-security-2fa-codes-to-be-replaced-by-single-step-login/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
copy ... toOt ... paste<p><a href="https://social.tchncs.de/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> so:<br>Hier kannst du einen sicheren Login mit <a href="https://social.tchncs.de/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> einrichten.</p><p>auch LinkedIn:<br>Hier sind täglich 10 unverschlüsselt übertragene Emails, die Links enthalten, die dich direkt einloggen.</p><p>Was zur Hölle?</p>
Abimelech B. 🐧🇩🇪| wörk ™️<p>"Für Nutzer mit aktivierter Zwei-Faktor-Authentifizierung (2FA) war CVE-2023-7028 grundsätzlich weniger problematisch, da das Passwort allein in diesem Fall für den Zugriff auf das jeweilige Konto nicht ausreicht. Dieser Umstand verdeutlicht einmal mehr, wie wichtig es ist, von derartigen Sicherheitsfunktionen Gebrauch zu machen."</p><p><a href="https://www.golem.de/news/sicherheitsluecke-per-passwort-reset-fremde-gitlab-konten-infiltriert-2503-193884.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/sicherheitslueck</span><span class="invisible">e-per-passwort-reset-fremde-gitlab-konten-infiltriert-2503-193884.html</span></a></p><p><a href="https://fulda.social/tags/mfa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mfa</span></a> <a href="https://fulda.social/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a> <a href="https://fulda.social/tags/gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitlab</span></a><br><a href="https://fulda.social/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://fulda.social/tags/cve_2023_7028" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve_2023_7028</span></a></p>
Terence Eden<p>🆕 blog! “Towards a test-suite for TOTP codes”</p><p>Because I'm a massive nerd, I actually try to read specification documents. As I've ranted ad nauseam about the current TOTP spec being irresponsibly obsolete.</p><p>The three major implementations of the spec - Google, Apple, and Yubico - all subtly disagree on how it should be implemented. Every other MFA…</p><p>👀 Read more: <a href="https://shkspr.mobi/blog/2025/03/towards-a-test-suite-for-totp-codes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/03/towar</span><span class="invisible">ds-a-test-suite-for-totp-codes/</span></a><br>⸻<br><a href="https://mastodon.social/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/HTOP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTOP</span></a> <a href="https://mastodon.social/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/totp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>totp</span></a></p>
Terence Eden’s Blog<p><strong>Towards a test-suite for TOTP codes</strong></p><p><a href="https://shkspr.mobi/blog/2025/03/towards-a-test-suite-for-totp-codes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/03/towar</span><span class="invisible">ds-a-test-suite-for-totp-codes/</span></a></p><p>Because I'm a massive nerd, I <em>actually try to read</em> specification documents. As I've ranted <i>ad nauseam</i> about the current TOTP0 spec being <a href="https://shkspr.mobi/blog/2025/02/the-least-secure-totp-code-possible/" rel="nofollow noopener noreferrer" target="_blank">irresponsibly obsolete</a>.</p><p>The three major implementations of the spec - <a href="https://github.com/google/google-authenticator/wiki/Key-Uri-Format" rel="nofollow noopener noreferrer" target="_blank">Google</a>, <a href="https://developer.apple.com/documentation/authenticationservices/securing-logins-with-icloud-keychain-verification-codes#3795996" rel="nofollow noopener noreferrer" target="_blank">Apple</a>, and <a href="https://docs.yubico.com/yesdk/users-manual/application-oath/uri-string-format.html" rel="nofollow noopener noreferrer" target="_blank">Yubico</a> - all subtly disagree on how it should be implemented. Every other MFA app has their own idiosyncratic variants. The <a href="https://datatracker.ietf.org/doc/html/rfc6238" rel="nofollow noopener noreferrer" target="_blank">official RFC is infuriatingly vague</a>. That's no good for a security specification. Multiple implementations are great, multiple interpretations are not.</p><p>So I've <a href="https://edent.codeberg.page/TOTP_Test_Suite/" rel="nofollow noopener noreferrer" target="_blank">built a nascent test suite</a> - you can use it to see if your favourite app can correctly implement the TOTP standard.</p><p><a href="https://edent.codeberg.page/TOTP_Test_Suite/" rel="nofollow noopener noreferrer" target="_blank"></a></p><p>Please do contribute tests and / or feedback.</p><p>Here's what the standard <em>actually</em> says - see if you can find apps which don't implement it correctly.</p><p><strong>Background</strong></p><p>Time-based One Time Passwords are based on HOTP - HMAC-Based One-Time Password.</p><p>HOTP uses counters; a new password is regularly generated. TOTP uses time as the counter. At the time of writing this post, there have been about 1,740,800,000 seconds since the UNIX Epoc. So a TOTP with an period of 30 seconds is on counter (1,740,800,000 ➗ 30) = 58,026,666. Every 30 seconds, that counter increments by one.</p><p><strong>Number of digits</strong></p><p>How many digits should your 2FA token have? Google says 6 or 8. YubiCo graciously allows 7. Why those limits? Who knows!?</p><p><a href="https://datatracker.ietf.org/doc/html/rfc4226#section-5.4" rel="nofollow noopener noreferrer" target="_blank">The HOTP specification gives an <em>example</em> of 6 digits</a>. The example generates a code of <code>0x50ef7f19</code> which, in decimal, is <code>1357872921</code>. It then takes the last 6 digits to produce the code <code>872921</code>.</p><p>The TOTP RFC say:</p><blockquote><p>Basically, the output of the HMAC-SHA-1 calculation is truncated to obtain user-friendly values <a href="https://datatracker.ietf.org/doc/html/rfc6238#section-1.2" rel="nofollow noopener noreferrer" target="_blank">1.2. Background</a></p></blockquote><p>But doesn't say how far to truncate.</p><p>There's nothing I can see in the spec that <em>prevents</em> an implementer using all 10. The HOTP spec, however, <em>does</em> place a minimum requirement - but no maximum:</p><blockquote><p>Implementations MUST extract a 6-digit code at a minimum and possibly 7 and 8-digit code. Depending on security requirements, Digit = 7 or more SHOULD be considered in order to extract a longer HOTP value. <a href="https://datatracker.ietf.org/doc/html/rfc4226#section-5.3" rel="nofollow noopener noreferrer" target="_blank">RFC 4226 - 5.3. Generating an HOTP Value</a></p></blockquote><p>(As a minor point, the first digit is restricted to 0-2, so being 10 digits long isn't significantly stronger than 9 digits.)</p><p>Is a 4 digit code acceptable? The security might be weaker, but the usability is greater. Most apps will allow a <em>one</em> digit code to be returned. If no digits are specified, what should the default be?</p><p><strong>Algorithm</strong></p><p>The given algorithm in the HOTP spec is SHA-1.</p><blockquote><p>In order to create the HOTP value, we will use the HMAC-SHA-1 algorithm <a href="https://datatracker.ietf.org/doc/html/rfc4226#section-5.2" rel="nofollow noopener noreferrer" target="_blank">RFC 4226 - 5.2. Description</a></p></blockquote><p>As we now know, SHA-1 has some fundamental weaknesses. The spec comments (perhaps somewhat naïvely) about SHA-1:</p><blockquote><p>The new attacks on SHA-1 have no impact on the security of HMAC-SHA-1. <a href="https://datatracker.ietf.org/doc/html/rfc4226#appendix-B.2" rel="nofollow noopener noreferrer" target="_blank">RFC 4226 - B.2. HMAC-SHA-1 Status</a></p></blockquote><p>I daresay that's accurate. But the TOTP authors disagree and allow a for some different algorithms to be used. The specification for HMAC says:</p><blockquote><p>HMAC can be used with <em>any</em> iterative cryptographic hash function, e.g., MD5, SHA-1 [Emphasis added] <a href="https://datatracker.ietf.org/doc/html/rfc2104" rel="nofollow noopener noreferrer" target="_blank">RFC 2104 - HMAC: Keyed-Hashing for Message Authentication</a></p></blockquote><p>So most TOTP implementation allow SHA-1, SHA-256, and SHA-512.</p><blockquote><p>TOTP implementations MAY use HMAC-SHA-256 or HMAC-SHA-512 functions […] instead of the HMAC-SHA-1 function that has been specified for the HOTP computation <a href="https://datatracker.ietf.org/doc/html/rfc6238#section-1.2" rel="nofollow noopener noreferrer" target="_blank">RFC 6238 - TOTP: Time-Based One-Time Password Algorithm</a></p></blockquote><p>But the HOTP spec goes on to say:</p><blockquote><p>Current candidates for such hash functions include SHA-1, MD5, RIPEMD-128/160. These different realizations of HMAC will be denoted by HMAC-SHA1, HMAC-MD5, HMAC-RIPEMD <a href="https://datatracker.ietf.org/doc/html/rfc2104#section-1" rel="nofollow noopener noreferrer" target="_blank">RFC 2104 - Introduction</a></p></blockquote><p>So, should your TOTP app be able to handle an MD5 HMAC, or even SHA3-384? Will it? If no algorithm is specified, what should the default be?</p><p><strong>Period</strong></p><p>As discussed, this is what increments the counter for HOTP. The <a href="https://github.com/google/google-authenticator/wiki/Key-Uri-Format" rel="nofollow noopener noreferrer" target="_blank">Google Spec</a> says:</p><blockquote><p>The period parameter defines a period that a TOTP code will be valid for, in seconds. The default value is 30.</p></blockquote><p>The TOTP RFC says:</p><blockquote><p>We RECOMMEND a default time-step size of 30 seconds <a href="https://datatracker.ietf.org/doc/html/rfc6238#section-5.2" rel="nofollow noopener noreferrer" target="_blank">5.2. Validation and Time-Step Size</a></p></blockquote><p>It doesn't make sense to have a negative number of second. But what about one second? What about a thousand? Lots of apps artificially restrict TOTP codes to 15, 30, or 60 seconds. But there's no specification to define a maximum or minimum value.</p><p>A user with mobility difficulties or on a high-latency connection probably wants a 5 minute validity period. Conversely, machine-to-machine communication can probably be done with a single-second (or lower) time period.</p><p><strong>Secret</strong></p><p>Google says the secret is</p><blockquote><p>an arbitrary key value encoded in Base32 according to RFC 3548. The padding specified in RFC 3548 section 2.2 is not required and should be omitted.</p></blockquote><p>Whereas Apple says it is:</p><blockquote><p>An arbitrary key value encoded in Base32. Secrets should be at least 160 bits.</p></blockquote><p>Can a shared secret be a single character? What about a thousand? Will padding characters cause a secret to be rejected or can they be safely stripped?</p><p><strong>Label</strong></p><p>The label allows you to have multiple codes for the same service. For example <code>Big Bank:Personal Account</code> and <code>Big Bank:Family Savings</code>. The Google spec is slightly confusing:</p><blockquote><p>The issuer prefix and account name should be separated by a literal or url-encoded colon, and optional spaces may precede the account name. Neither issuer nor account name may themselves contain a colon.</p></blockquote><p>What happens if they are <em>not</em> URl encoded? What about Matrix accounts which use a colon in their account name? Why are spaces allowed to precede the account name? Is there any practical limit to the length of these strings?</p><p>If no label is specified, what should the default be?</p><p><strong>Issuer</strong></p><p>Google says this parameter is:</p><blockquote><p><strong>Strongly Recommended</strong> The issuer parameter is a string value indicating the provider or service this account is associated with, URL-encoded according to RFC 3986. If the issuer parameter is absent, issuer information may be taken from the issuer prefix of the label. If both issuer parameter and issuer label prefix are present, they should be equal.</p></blockquote><p>Apple merely says:</p><blockquote><p>The domain of the site or app. The password manager uses this field to suggest credentials when setting up a new code generator.</p></blockquote><p>Yubico equivocates with</p><blockquote><p>The issuer parameter is recommended, but it can be absent. Also, the issuer parameter and issuer string in label should be equal.</p></blockquote><p>If it isn't a domain, will Apple reject it? What happens if the issuer and the label don't match?</p><p><strong>Next Steps</strong></p><ul><li>If you're a user, <a href="https://codeberg.org/edent/TOTP_Test_Suite" rel="nofollow noopener noreferrer" target="_blank">please contribute tests</a> or give feedback.</li><li>If you're a developer, please check your app conforms to the specification.</li><li>If you're from Google, Apple, Yubico, or another security company - wanna help me write up a proper RFC so this doesn't cause issues in the future?</li></ul> <ol start="0"><li><p>Time-based One Time Passwords. Not the TV show you remember from your youth, grandad.&nbsp;↩︎</p></li></ol> <p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/2fa/" target="_blank">#2fa</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/cybersecurity/" target="_blank">#CyberSecurity</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/htop/" target="_blank">#HTOP</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/mfa/" target="_blank">#MFA</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/open-source/" target="_blank">#OpenSource</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/totp/" target="_blank">#totp</a></p>
teufelswerk<p>Zapier (NoCode-Software) informierte am Freitag Kunden darüber, dass ein Unbefugter Zugriff auf Code-Repositories u. Kundendaten erhalten habe. Der Unbefugte konnte aufgrund einer Fehlkonfiguration der Zwei-Faktor-Authentifizierung (2FA) im Konto eines Mitarbeiters auf die Repositories zugreifen. Die Repositories hätten aber keine Kundendaten enthalten dürfen. Diese wurden versehentlich von Zapier hineinkopiert...</p><p><a href="https://www.theverge.com/news/622026/zapier-data-breach-code-repositories" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/news/622026/zapie</span><span class="invisible">r-data-breach-code-repositories</span></a></p><p><a href="https://social.tchncs.de/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.tchncs.de/tags/mfa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mfa</span></a> <a href="https://social.tchncs.de/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a> <a href="https://social.tchncs.de/tags/leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leak</span></a> <a href="https://social.tchncs.de/tags/misconfiguration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>misconfiguration</span></a> <a href="https://social.tchncs.de/tags/zapier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zapier</span></a></p>
julian<p>2FA codes sent over ActivityPub when?</p>
Tuta<p>The <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Trinity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trinity</span></a> - spotted at <span class="h-card" translate="no"><a href="https://fosstodon.org/@bitwarden" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bitwarden</span></a></span> explains how to secure your accounts with 2FA:</p><p>👉 <a href="https://bitwarden.com/resources/presentations/the-triangle-of-security-success/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bitwarden.com/resources/presen</span><span class="invisible">tations/the-triangle-of-security-success/</span></a></p><p>And rightly so: Because <a href="https://mastodon.social/tags/encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypted</span></a> email get even more secure with <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> and <a href="https://mastodon.social/tags/passwordmanagers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwordmanagers</span></a> 💪</p><p>Check out our top 3:<br><a href="https://tuta.com/blog/best-password-manager" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tuta.com/blog/best-password-ma</span><span class="invisible">nager</span></a></p>
Korrespondent zur See<p>Was ich lese: "… senden wir alle Ihre <a href="https://mastodon.social/tags/SMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMS</span></a>-Nachrichten an ein [vermutlich US-basiertes] AI-Unternehmen." - In 2025 sind das bei mir 50/50 Spam und Bestätigungscodes. Wahlweise erhalten damit <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a>, <a href="https://mastodon.social/tags/Facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facebook</span></a>, [$AiTechBude] umfangreiche Listen von Diensten, bei denen ich SMS für <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> nutze (inkl. Absendernummern und meine Empfängernummer) und mit der Drohung, an mich gerichtete SMS zu blockieren. – Hat vielleicht jemand aus der <a href="https://mastodon.social/tags/netzpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netzpol</span></a> Szene Infos? (<span class="h-card" translate="no"><a href="https://23.social/@linuzifer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>linuzifer</span></a></span> ?) <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a></p>
Tarnkappe.info<p>📬 mailbox.org 2FA im Fokus: Wann wird es endlich so bequem wie sicher?<br><a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> <a href="https://social.tchncs.de/tags/Mailboxorg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mailboxorg</span></a> <a href="https://social.tchncs.de/tags/mailboxorg2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailboxorg2fa</span></a> <a href="https://social.tchncs.de/tags/Mailboxorg2FAaktivieren" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mailboxorg2FAaktivieren</span></a> <a href="https://social.tchncs.de/tags/mailboxorgZweiFaktorSchutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailboxorgZweiFaktorSchutz</span></a> <a href="https://social.tchncs.de/tags/Problememit2FAbeiMailboxorg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Problememit2FAbeiMailboxorg</span></a> <a href="https://sc.tarnkappe.info/bb0bf5" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/bb0bf5</span><span class="invisible"></span></a></p>