@yogthos That’s expected when the name includes ‘Google’…
indeed, it’s basically a spyware company at this point
It always has been ever since they got a DARPA grant back in the day
true
Trusting your security to Google is literally like trusting a fox to guard your hen house.
Aegis collects no data.
I use Aegis, it does what’s on the tin.
I read their article but didn’t understand their methodology. This is pretty much in contrast to this video where a bunch of apps got audited and to everyone’s surprise Google Authenticator seemed like one of the most private alternatives.
Really not trying to defend Google here because… they’re fucking Google, but I’m wondering why the results are so different.
Same. I also checked the data usage on my phone and google authenticator has used NO mobile data since I’ve had it installed for over a year. So I’m calling bullshit on this article.
I also do not see nearly as many permissions requested as in that screenshot. It needs photo and video permissions because you can upload qr codes and stuff. Also you can (don’t have to) link it your google account, so obviously it would have access to your google stuff.
Yeah what can be done is create a clean Google account registered through an anonymous phone number and a throwaway user name & password, and best to secure it with a hardware key just to make sure no one can get into your OTPs by somehow getting access to those credentials. That should allow you to save credentials in an account at least if you make sure to not login to it on the same device as your other accounts.
But also not blaming anyone for not trusting Google in the first place.
Shocking! The authenticator from the company which hoards all the data it can get from you and then more, hoards all the data it can get from you and then more!
Also: discover how the scientists discovered that every 60 minutes, an hour passes.
More news at 9.