GitHub will require 2FA by the end of 2023

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

Our great sponsors
  • SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • ipvc

    Inter-Planetary Version Control (System)

  • I appreciate that there's a response to the 'supply chain attack' issue, but this also seems like we're raising the bar further for participation. I'm still dubious as to whether a phone is required but even if it's not, this now puts a high bar for anyone who doesn't have a phone and creates all sorts of anonymity issues for people that do.

    Git is decentralized. My feeling is we should be focusing on technologies that lean into that idea.

    Inter-Planetary Version Control [0] looks to be a defunct project but hits the keywords that fit what I imagine to be a viable alternative. Does anyone know other alternatives?

    [0] https://github.com/martindbp/ipvc

  • totp

    Time-Based One-Time Password Code Generator (by arcanericky)

  • TOTP never requires a phone number. On GitHub, they either show you a qr code you can scan in an app, or a text you can import. All apps support this sign up process, from google authenticator to console-based tools like totp[0].

    Other 2FA may require phone numbers.

    [0]: https://github.com/arcanericky/totp

  • SurveyJS

    Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App. With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.

    SurveyJS logo
  • notes

    Some public notes (by ChALkeR)

  • This change would certainly have helped against the infamous "Gathering weak npm credentials" research[0] from 2017, but I think that most recent supply chain security issues (in NPM, at least) have been due to: 1) typosquatting, 2) developers deliberately adding malicious (or unwanted) code into their own packages, and 3) deep transitive dependencies on packages that have genuine bugs that lead to vulnerabilities.

    It's not clear that this 2FA requirement would fix any of those problems, but it could one day allow package management tools to flag up when one developer has given/sold control of their package over to someone else who has less of a reputation and might be malicious, as was the case with the event-stream package.[1]

    [0] https://github.com/ChALkeR/notes/blob/master/Gathering-weak-...

    [1] https://www.eweek.com/security/node.js-event-stream-hack-exp...

  • gpg-backup

    Tools for backing up GPG keys and S3 credentials.

  • I wrote some scripts to generate QR codes, then printed them to photo paper.

    https://github.com/alexjh/gpg-backup/blob/master/Makefile

    Back then I thought that QR codes were a bit of a gimmick but now I'm way more confident that I'll be able to read them in the future.

  • sso-wall-of-shame

    A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.

  • Yes, but SSO makes writing those policies (across all apps) much simpler. I think it's too bad that SSO is so heavily taxed, because it's quite an elegant way to solve account provisioning.

    Interesting site: https://sso.tax/

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts