I have read quite a few posts about preventing account password takeover from various malicious ways, and many OPSEC measures are there to prevent it from happening.

Consider a case where you face a total blackout or technical failure. Now, you need to log in to your password manager, which requires either OTP on email or TOTP. You don’t have access to the TOTP app because the backup is stored in cloud storage, whose email login also requires OTP.

How would you prevent such from happening?I haven’t found a satisfactory solution or explanation for that yet.

  • Katlah@lemmy.dbzer0.com
    cake
    link
    fedilink
    English
    arrow-up
    49
    ·
    edit-2
    2 months ago

    You backup your 2FA locally. Problem solved.

    If you’re using the cloud for anything related to security you’re doing something wrong. (In my opinion)

    • Extras@lemmy.today
      link
      fedilink
      arrow-up
      17
      ·
      edit-2
      2 months ago

      Just to add on what you want is the 3,2,1 method of backing up. You’re asking for trouble if you just rely on cloud storage for anything that important. Export your TOTP seeds or copy your 8-10 generated OTPs. If shit hits the fan you’ll be able to use a TOTP generator or a password manager that has one built in to get your codes.