• shaserlark@sh.itjust.works
    link
    fedilink
    arrow-up
    4
    ·
    13 days ago

    I read their article but didn’t understand their methodology. This is pretty much in contrast to this video where a bunch of apps got audited and to everyone’s surprise Google Authenticator seemed like one of the most private alternatives.

    Really not trying to defend Google here because… they’re fucking Google, but I’m wondering why the results are so different.

    • FeelzGoodMan420@eviltoast.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      13 days ago

      Same. I also checked the data usage on my phone and google authenticator has used NO mobile data since I’ve had it installed for over a year. So I’m calling bullshit on this article.

      I also do not see nearly as many permissions requested as in that screenshot. It needs photo and video permissions because you can upload qr codes and stuff. Also you can (don’t have to) link it your google account, so obviously it would have access to your google stuff.

      • shaserlark@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        13 days ago

        Yeah what can be done is create a clean Google account registered through an anonymous phone number and a throwaway user name & password, and best to secure it with a hardware key just to make sure no one can get into your OTPs by somehow getting access to those credentials. That should allow you to save credentials in an account at least if you make sure to not login to it on the same device as your other accounts.

        But also not blaming anyone for not trusting Google in the first place.