gauth | solo1 | |
---|---|---|
5 | 57 | |
305 | 2,278 | |
- | 0.8% | |
3.4 | 0.0 | |
3 months ago | over 1 year ago | |
Go | C | |
ISC License | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gauth
Posts with mentions or reviews of gauth.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-11-02.
- Aegis Authenticator – Secure 2FA App for Android
-
TOTP tokens on my wrist with the smartest dumb watch
I use https://github.com/pcarrier/gauth
It relies on file permissions so is not exactly robustly secure (no idea about RAM vulnerabilities etc).
As per the author, I consider my laptop the fundamental point of vulnerability. If someone else gets access to it, I'll know and I'll hit the metaphorical panic button :)
- Ask HN: Does anyone else think this 2FA everywhere is getting out of hand?
-
Ask HN: Why is today's Internet experience so user hostile?
I was able to take a screenshot of GAuth backups on iPhone using the button hotkeys(IE: Power+Volume up). I setup a container that runs a go version of GAuth and used a python script to decrypt the (decrypted QR code) backup keys. Then I backed up the encrypted keyfile to offline disk, encrypted the container backup and deleted it from the hypervisor.
https://github.com/pcarrier/gauth
https://github.com/scito/extract_otp_secret_keys
-
A simpler and safer future – without passwords
> A future without passwords
No, thank you, especially if Google is going to be the gatekeeper.
https://github.com/pcarrier/gauth FTW
solo1
Posts with mentions or reviews of solo1.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-05-02.
-
Passkey Implementation: Misconceptions, pitfalls and unknown unknowns
All phones ask for PIN or pattern in addition to face/fingerprint. Use that.
For the average user this is safe enough. (i.e) keep google/apple password safe. Then all is fine.
> exporting and FAANG lock-in
You don't ever have to even sign into FAANG if you can put up with inconvenience.
- Buy a U2F FIDO key like OPEN SOURCE https://solokeys.com/ or Yubikey etc
- Thetis, Yubikey, Solokey, Nitrokey, Onlykey, etc. Differences and Compatability?
- Yubico is merging with ACQ Bure and intends to go public
-
alternative to yubikey with requirements?
Try Solokeys https://solokeys.com v2 is open source USB-C and NFC compatible work with FIDO and web Auth.
- How to Yubikey: A Configuration Cheatsheet
- GitHub Mandates 2FA for All Developers
- The Blue Is Gone
-
On using bitwarden for TOTP:
Also take a look at solokeys. They are very affordable and support FIDO2 and FIDO U2F -- meaning they have overlapping protocols with Bitwarden, and they certainly work on Google.
-
Wanting to setup a luks USB key system
Try This
-
Sign in with Google has been removed for your privacy
You might want to check out https://solokeys.com/ then. They're pretty new (shipping for about a year) but they do full FOSS firmware & software as well as most hardware being FOSS as well.