I use https://github.com/pcarrier/gauth
It relies on file permissions so is not exactly robustly secure (no idea about RAM vulnerabilities etc).
As per the author, I consider my laptop the fundamental point of vulnerability. If someone else gets access to it, I'll know and I'll hit the metaphorical panic button :)
Edit: I recently set up a new laptop, and copied my OTP seeds from Aegis into gauth without a hitch. Another step closer to me moving away from Authy.
Use terminal!
• Get: https://github.com/pcarrier/gauth
• Edit: gauth.csv (1 line per account)
• Do: watch gauth (1 line per account)
• Profit!
11
I manage them with this:
I was able to take a screenshot of GAuth backups on iPhone using the button hotkeys(IE: Power+Volume up). I setup a container that runs a go version of GAuth and used a python script to decrypt the (decrypted QR code) backup keys. Then I backed up the encrypted keyfile to offline disk, encrypted the container backup and deleted it from the hypervisor.
> A future without passwords
No, thank you, especially if Google is going to be the gatekeeper.