• Agosto

    4

    2025
  • 22
  • 0

Stop Relying on SMS — Get a Real Authenticator App and Sleep Better

Whoa! Two-factor authentication (2FA) is one of those things everyone thinks they have covered until they don’t. Seriously? Yup. My first reaction when someone says “I have 2FA” is to ask: “Which kind?” Short answer: SMS-based codes are fragile. Long answer: use an authenticator app for most accounts — it’s faster, more private, and a lot more secure when done right.

Okay, so check this out — I’m biased, but I’ve spent years building and evaluating security software, and my instinct said years ago to move away from text messages for second factors. Initially I thought SMS was “good enough” for casual stuff, but then I realized how trivial SIM-swaps and carrier-level attacks can be. Actually, wait—let me rephrase that: SMS is better than nothing, but compared to time-based one-time-password (TOTP) apps it’s a weak link.

Here’s what bugs me about SMS: you don’t control the phone number, carriers have flaws, and recovery processes at big providers often rely on that same number. On one hand, convenience is great. On the other hand, convenience here is an attack vector. Hmm… somethin’ about that always felt off.

Hand holding phone showing authenticator app codes

Why an authenticator app beats SMS (and when to prefer hardware keys)

Short: apps generate codes offline. Medium: TOTP apps derive codes from a secret seed that your service gives you when you enable 2FA, and they compute 6-digit numbers every 30 seconds—no network needed. Longer thought: because the secret lives on your device and not in transit, attackers must either get that secret or compromise your unlocked device to generate codes, which raises the bar dramatically.

That said, device theft and backups matter. If you lose your phone and you didn’t save backup codes, you can be locked out. So here’s a rough rule of thumb: use an authenticator app for most accounts; use a hardware security key for very high-value accounts (banking, primary email, corporate admin); keep printed or offline backup codes in a safe place. I’m not 100% sure every user needs a YubiKey, but for admins? Absolutely consider it.

Okay—practical point. If you don’t have an app yet, go get one. For desktop and mobile installers, consider a reputable source; for convenience, here’s a reliable place for an authenticator download. This is handy when you want a desktop companion or need to install on a new machine. (Oh, and by the way… keep that installer updated.)

Some people ask, “What about Google Authenticator?” Good question. Google Authenticator is simple, widely supported, and offline. It works well for TOTP. But it has limitations: historically no cloud backup (so migration is manual), and the interface is minimalist. Alternatives like Authy, Microsoft Authenticator, and others add encrypted backups and multi-device syncing, which helps if you lose your phone — though those features increase your attack surface slightly because they introduce cloud storage.

Initially I favored minimalism: less surface, less worry. But then I started recommending Authenticator apps that offer secure backups for average users, because realistically people lose phones. On one hand, that cloud backup is convenient; though actually if the backup is poorly implemented it can be exploited. So weigh your needs. If you’re allergic to cloud, pick a local-only TOTP app and follow a rigorous migration plan.

Let me walk you through the practical setup and migration patterns that usually work in the real world — yes, the real world, with messy accounts and half-saved recovery codes…

Step 1: Start with the highest-value accounts. Email first. Why? Because email often controls password resets. If someone owns your email, they own password resets. Protect it with an authenticator app or a hardware key. Step 2: Enable TOTP where available. Follow service prompts, scan the QR, and save the recovery codes in a password manager or printed safe. Step 3: Migrate carefully—do not delete the 2FA method from the old device until you’ve verified the new device works.

Real example: I once helped a friend who had Google Authenticator on a phone that died. They had no backup codes. We had to get their ISP and their bank involved for account recovery—and that was months of hassle. So yeah, backups are very very important. If you’re lazy, at least take a photo of the printed recovery codes and lock that image in an encrypted folder or a password manager.

Another tip: label your 2FA entries in the app. Many people end up with “Account (1)” and “Account (2)” chaos. Clear labels reduce the chance you’ll try the wrong code and lock yourself out.

Migration strategies vary by app. Google Authenticator used to be painful for transfers, requiring manual QR rescans or export/import flows. Newer versions added an account transfer feature. Apps like Authy let you backup to the cloud (encrypted), and restore on a new device after verifying your identity. Both approaches have tradeoffs. If you choose a cloud-backup-capable app, secure the backup with a strong master password that you won’t forget.

Threat model time. Who are you protecting against? Casual thieves? Script kiddies? Nation-state actors? Your approach scales: for everyday users, TOTP apps plus strong passwords and occasional backups are enough. For high-risk profiles, add hardware keys, separate recovery emails, and a dedicated, minimal-usage account for recovery. I know—sounds extreme. But when people ask why their high-value account was compromised, it’s often because recovery channels were ignored.

Also: be careful with account recovery procedures at services. Some will accept SMS or phone calls as primary recovery—so if you lock down your SMS but leave that recovery option enabled, you haven’t gained much. Check each service’s recovery settings and remove weak options when possible.

One more thing: cross-device usage. Some users want codes on both phone and desktop. Desktop authenticator apps or browser extensions exist, but be wary of browser extensions that have wide permissions. If you choose a desktop client, keep it updated and use OS-level protections (disk encryption, login passwords). If you use multiple devices, ensure they all are part of your threat model and secured accordingly.

Here’s a quick checklist you can run through right now: 1) Enable TOTP on main email. 2) Save recovery codes offline. 3) Choose an authenticator app that matches your backup preference. 4) Add a hardware key to top-tier accounts. 5) Remove SMS where possible. Do it in that order. Simple, but effective.

I’m not perfect at following all this either—I’ve lost a backup code before and cursed for a week. Humans are messy. So plan for messiness.

FAQ

Do I have to use Google Authenticator?

No. Google Authenticator is fine for TOTP, but there are alternatives (Authy, Microsoft Authenticator, and others) that offer different tradeoffs like cloud backups or multi-device support. Choose based on how you value convenience versus attack surface.

What if I lose my phone?

If you saved recovery codes, use them to regain access. If not, follow the service’s recovery steps, which can be slow and painful. Consider apps that offer encrypted backups to avoid this scenario, or keep a hardware key for critical accounts.

Are hardware keys better?

Yes for high-value cases. Hardware security keys (FIDO2/WebAuthn) are strong because they require physical possession. For everyday accounts, TOTP apps are sufficient and far better than SMS. For admins and critical services, add a hardware key.

LEAVE A COMMENT

Your comment will be published within 24 hours.

© Copyright 2017 FIMEL S.r.l - C.F./P.IVA 08822961002 - Note legali

Secure multi-chain DeFi wallet for Cosmos ecosystem - https://keplrwallet.app - manage staking, swaps, and NFTs with low fees.