user263839573
My feedback
15 results found
-
38 votes
user263839573
supported this idea
·
-
53 votes
user263839573
supported this idea
·
-
4 votes
user263839573
supported this idea
·
-
2 votes
user263839573
supported this idea
·
-
1 vote
user263839573
shared this idea
·
-
24 votes
user263839573
supported this idea
·
-
2,741 votes
Subscribers now have access to offline view with the introduction of the Proton Pass desktop app for Windows:
For more information, including what's coming next, check out: https://proton.me/blog/proton-pass-windows-app
user263839573
supported this idea
·
-
444 votes
user263839573
supported this idea
·
-
7 votes
user263839573
supported this idea
·
-
55 votes
user263839573
supported this idea
·
-
15 votes
user263839573
supported this idea
·
-
1,753 votes
An error occurred while saving the comment
user263839573
supported this idea
·
-
753 votes
user263839573
supported this idea
·
-
1,567 votes
user263839573
supported this idea
·
-
1,691 votes
user263839573
supported this idea
·
While I agree that this should be an option, I just wanna remind everyone that the only reasonable attack vector of TOTP is phishing.
Meaning if you never use it and just refuse to authenticate with it, always use your hardware keys instead you are safe.
Provided you store your TOTP credentials in a safe place… or not store them at all after setup – that’s up to you.
Guessing TOTPs is not viable and in any scenario where an attacker gained enough privileges to somehow reach your stored OTP credentials, wherever you store them, you are usually in a lot of trouble already anyways… meaning if it comes that far it doesn’t really matter anymore, you are screwed already.