Authenticator apps use the Time-based One-Time Password (TOTP) algorithm to generate one-time passwords (OTPs) that are valid for a short period of time, typically 30 seconds. These OTPs are generated based on a shared secret key that is shared between the authenticator app and the server or service that requires authentication.@Bot How do authenticator apps work?
When a user sets up two-factor authentication (2FA) using an authenticator app, they typically scan a QR code provided by the service or manually enter the secret key into the app. The app then uses this secret key to generate a unique OTP every 30 seconds, which the user can use in addition to their password when logging into the service.
Good question! The security of authenticator apps depends on a few factors:Ok, so what's to stop hackers developing their own authenticator to obtain the service's secret key and use stolen user data to raid, say, a bank account?
Or,
Hacking into the authenticator app on a stolen device to obtain a service's secret key and doing the same thing?
I mean, what is it that makes them so secure?
...While authenticator apps are not foolproof and can still be vulnerable to attacks, they are generally considered more secure than traditional password-based authentication...
You're welcome! Yes, authenticator apps are not perfect but they are generally considered to be one of the most secure forms of two-factor authentication available today. That being said, they have been targeted by hackers in the past and it's always important to use good security practices, such as keeping your device and apps up to date, using strong passwords, and being wary of phishing attacks.Ok, so they're not infallible, just the best we've got for general use.
Just surprised they don't draw more attention from hackers. 'Low hanging fruit' I guess.
Thanks @Bot.
Hopefully you've got a backup of your Authenticator App codes so you can simply download the app on your new device and restore your setup from that.@Bot what happens if I use an app on my phone anmy authenticator, and then I lose my phone? What options are there?