Battle Authy or Microsoft Authenticator 2FA?

reystar

Level 3
Thread author
Verified
Feb 4, 2014
105
Which 2FA application do you guys recommend for 2FA use? I have been using Google Authenticator but, because I swap phones couple times a year I cba to move all of them all the time, plus i will be doomed if I lose the phone...so I am looking for something like Authy or MS Authenticator that will sync
 

SeriousHoax

Level 47
Verified
Top Poster
Well-known
Mar 16, 2019
3,633
2 trackers ( Google CrashLytics & Google Firebase Analytics ),
9 permissions (view network connections , view Wi-Fi connections, run foreground service, have full network access, prevent phone from sleeping) are the important ones.
CrashLytics and Firebase are not the typical privacy invasive trackers. These are application telemetry and crash report related and the permissions are also fine for it to function properly.
 
F

ForgottenSeer 85179

CrashLytics and Firebase are not the typical privacy invasive trackers. These are application telemetry and crash report related and the permissions are also fine for it to function properly.
I disagree but it's your choice :)

For me such shouldn't exist in a important app like 2FA.
 
  • Like
Reactions: ANNOx

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
CrashLytics and Firebase are not the typical privacy invasive trackers. These are application telemetry and crash report related and the permissions are also fine for it to function properly.
When I saw his post I thought Google was going to start tracking me, sell my data and send Ad leaflets through the letterbox.

Thanks for the info, I longer need to microwave my phone to maintain my privacy. Was a very close call.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top