Our great sponsors
-
Several options...
Not exactly the same, but if you're using Bitwarden (which is compatible with generating TOTP tokens) to manage your passwords, you can use their bitwarden-cli tool to request tokens from the cli: https://bitwarden.com/help/cli/#get
But if you want the simplest cli thing, you can probably can use this golang ( https://github.com/yitsushi/totp-cli ) or this python ( https://github.com/WhyNotHugo/totp-cli ) implementations.
-
If you're a bit weirded out by the website secret pasting, I made a PR which lets the sensor watch load TOTP secrets from an Aegis export (essentially just a bunch of TOTP URIs):
https://github.com/joeycastillo/Sensor-Watch/pull/95
This is the reason I bought the board. It makes me happy not having to use my phone for this.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
-
-
Not for PineTime, but the bangle.js has a a 2FA TOTP app: https://banglejs.com/apps/?id=authentiwatch
-
Several options...
Not exactly the same, but if you're using Bitwarden (which is compatible with generating TOTP tokens) to manage your passwords, you can use their bitwarden-cli tool to request tokens from the cli: https://bitwarden.com/help/cli/#get
But if you want the simplest cli thing, you can probably can use this golang ( https://github.com/yitsushi/totp-cli ) or this python ( https://github.com/WhyNotHugo/totp-cli ) implementations.
-
keepassxc
KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
ios-application
A native, lightweight and secure one-time-password (OTP) client built for iOS; Raivo OTP!
Did you try Ravio OTP? I've seen good things said about it by FOSS people.
-
I have something similar too here: https://github.com/susam/mintotp
It reads secrets from the standard input (which is a general security best practice), one secret per line, and outputs TOTP values, one per line.
-
-
For the best smartwatch ever made I recommend Pebble Authenticator: https://github.com/Neal/pebble-authenticator
-
tpm2-totp
Attest the trustworthiness of a device against a human using time-based one-time passwords
You need a TPM 2.0 compatible CPU, but something like this sounds really excellent: https://github.com/tpm2-software/tpm2-totp
This means your laptop itself would be your hardware device, the TOTP secret would be stored in the TPM and theoretically impossible to steal/copy. Of course this means you will probably want a mobile device (possibly a second laptop also) as a backup.)
-
google-authenticator
Discontinued Open source version of Google Authenticator (except the Android app)
-
I have been using OTP Auth for a while. It doesn't get updated a lot but it's working fine.
-
I use https://github.com/pcarrier/gauth
It relies on file permissions so is not exactly robustly secure (no idea about RAM vulnerabilities etc).
As per the author, I consider my laptop the fundamental point of vulnerability. If someone else gets access to it, I'll know and I'll hit the metaphorical panic button :)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives