GitHub will require 2FA by the end of 2023

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  • ipvc

    Inter-Planetary Version Control (System)

    I appreciate that there's a response to the 'supply chain attack' issue, but this also seems like we're raising the bar further for participation. I'm still dubious as to whether a phone is required but even if it's not, this now puts a high bar for anyone who doesn't have a phone and creates all sorts of anonymity issues for people that do.

    Git is decentralized. My feeling is we should be focusing on technologies that lean into that idea.

    Inter-Planetary Version Control [0] looks to be a defunct project but hits the keywords that fit what I imagine to be a viable alternative. Does anyone know other alternatives?

    [0] https://github.com/martindbp/ipvc

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
  • totp

    Time-Based One-Time Password Code Generator (by arcanericky)

    TOTP never requires a phone number. On GitHub, they either show you a qr code you can scan in an app, or a text you can import. All apps support this sign up process, from google authenticator to console-based tools like totp[0].

    Other 2FA may require phone numbers.

    [0]: https://github.com/arcanericky/totp

  • notes

    Some public notes (by ChALkeR)

    This change would certainly have helped against the infamous "Gathering weak npm credentials" research[0] from 2017, but I think that most recent supply chain security issues (in NPM, at least) have been due to: 1) typosquatting, 2) developers deliberately adding malicious (or unwanted) code into their own packages, and 3) deep transitive dependencies on packages that have genuine bugs that lead to vulnerabilities.

    It's not clear that this 2FA requirement would fix any of those problems, but it could one day allow package management tools to flag up when one developer has given/sold control of their package over to someone else who has less of a reputation and might be malicious, as was the case with the event-stream package.[1]

    [0] https://github.com/ChALkeR/notes/blob/master/Gathering-weak-...

    [1] https://www.eweek.com/security/node.js-event-stream-hack-exp...

  • gpg-backup

    Tools for backing up GPG keys and S3 credentials.

    I wrote some scripts to generate QR codes, then printed them to photo paper.

    https://github.com/alexjh/gpg-backup/blob/master/Makefile

    Back then I thought that QR codes were a bit of a gimmick but now I'm way more confident that I'll be able to read them in the future.

  • sso-wall-of-shame

    A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.

    Yes, but SSO makes writing those policies (across all apps) much simpler. I think it's too bad that SSO is so heavily taxed, because it's quite an elegant way to solve account provisioning.

    Interesting site: https://sso.tax/

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • SMS Pumping Attack

    4 projects | news.ycombinator.com | 3 Aug 2023
  • Authenticator App for Multi Client Use

    1 project | /r/msp | 5 Aug 2022
  • ITSME, what do you use it for?

    1 project | /r/belgium | 13 Apr 2022
  • What are your guy's reasons for self hosting? Particularly cloud services.

    2 projects | /r/selfhosted | 6 Oct 2021
  • Recommended Online TOTP Generator?

    3 projects | /r/Bitwarden | 23 Jul 2021