this post was submitted on 28 Jan 2025
251 points (96.7% liked)
Technology
61227 readers
4054 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If you can login without the second factor then what's the point?
We already covered this at the top. You keep the recovery codes unexposed to the internet or obfuscated in some way, unlike your usual password. Therefore you can have confidence that they haven't been hacked, leaked, or whatever like passwords often are.
anyway I tire of your sea lioning. if you are truly asking good faith questions you can research on your own from here.
How is a strong password I used exclusively for Bitwarden "exposed to the internet"? I do see the value of this for people that don't care about security and reuse the same password everywhere. In that case you would need something like phishing to expose the 2FA code or the recovery code, just a leak of the email-password combination from another website would not be enough. But what's the point if I'm already using a unique strong password specifically for Bitwarden?