otpauth
keepassxc
otpauth | keepassxc | |
---|---|---|
10 | 513 | |
602 | 19,312 | |
- | 2.6% | |
4.8 | 8.9 | |
about 2 months ago | 3 days ago | |
Go | C++ | |
ISC License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
otpauth
-
Ask HN: How do you start over with 2FA and losing your phone?
will generate a PNG file for each account, name after the account name and site name, and containing the QR code for the account.
Going forward, save those PNGs somewhere secure (I use an encrypted tar file). Any new accounts you set up save the QR codes for those as PNGs and add them to your collection. If you keep that collection up to date you will be able to readily handle any device updates or replacements readily or adding new TOTP apps.
[1] https://github.com/dim13/otpauth
-
It Is New Phone Day - Don't Forget To Transfer Google Authenticator Before Wiping Your Phone!!!
afterwards you can use https://github.com/dim13/otpauth to convert the GAUTH code to plaintext
-
Transfer 2FA Tokens from GAUTH to Authy?
Open google authenticator, export accounts, screenshot QR code, decode with cyberchef, decode otpauth-migration link with https://github.com/dim13/otpauth
-
Google Authenticator Issues
Scan the code with something else and pass the string inside to a tool like this in order to get the individual tokens/codes: https://github.com/dim13/otpauth
- Hausdurchsuchung wegen 5 Gramm Gras - Handy mitgenommen
- Migrate TOTP from GAuth
-
Is there a way to backup everything in my Google Authenticator?
latest google authenticator has an export option. save the url or QR code and you will be able to load it in the next phone (or use a tool such as https://github.com/dim13/otpauth / https://github.com/digitalduke/otpauth-migration-decoder to decode the keys/timers and load in TOTP inside keypassx etc')
-
Request: support for optauth-migration links
The code on this page is a standard otpauth string.
-
Warning: Please stop using Google Authenticator for your 2FA/TOTP. It has a bad reputation of locking people out of all of their accounts if something happens to the device. There are other better/safer options. Here is my overall advice.
Not tested yet but this tool should allow you to create scanable QR codes for other auth apps as far as I understand. https://github.com/dim13/otpauth
- Show HN: Google Authenticator Migration Decoder
keepassxc
- Passkey Implementation: Misconceptions, pitfalls and unknown unknowns
- KeePassXC Issue: [Passkeys] should never be exported in clear text
- Authy to sunset EOL end of March 19, 2024 (originally August 2024)
-
I Stopped Using Passwords. It's Great–and a Total Mess
KeepassXC supports exporting, but i don't think it is released in a stable version / to the public yet:
https://github.com/keepassxreboot/keepassxc/pull/8825
-
Ask HN: Best Password Manager without cloud login?
If you use KeePass, make sure you use the KeePassXC variant. KeePass is dead.
https://keepassxc.org/
-
Do you trust password mangers?
That's why you use the superior one, KeePassXC, as linked in the NIST link: https://github.com/keepassxreboot/keepassxc/discussions/9433
- What program(s) do you use to remember passwords, including crypto?
-
Will Plasma 6 still keep X11 compatibility?
Over there, they got pissed about people constantly bugging them about it and closed the bug with the last comment reading:
-
Help a noob out, please.
for the internet, use a password manager like keepassxc with a strong password.
-
KDE Plasma 6.0 Is Enabling Wayland by Default
Another regression is that KeePassX/C AutoType doesn't work with Wayland, so now instead of a simple CTRL+V in KeePassXC, I have to separately copy and paste the user and the pass.
https://github.com/keepassxreboot/keepassxc/issues/2281
What are some alternatives?
otpauth-migration-decoder - Convert otpauth-migration to plain link
KeePassDX - Lightweight vault and password manager for Android, KeePassDX allows editing encrypted data in a single file in KeePass format and fill in the forms in a secure way.
ios-application - A native, lightweight and secure one-time-password (OTP) client built for iOS; Raivo OTP!
KeePass2.x - unofficial mirror of KeePass2.x source code
Aegis - A free, secure and open source app for Android to manage your 2-step verification tokens.
vaultwarden - Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
twirp - A simple RPC framework with protobuf service definitions
Strongbox - A KeePass/Password Safe Client for iOS and OS X
goprotobuf - Go support for Google's protocol buffers
MacPass - A native macOS KeePass client
otplib - :key: One Time Password (OTP) / 2FA for Node.js and Browser - Supports HOTP, TOTP and Google Authenticator