• shaserlark@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    16 days ago

    I read their article but didn’t understand their methodology. This is pretty much in contrast to this video where a bunch of apps got audited and to everyone’s surprise Google Authenticator seemed like one of the most private alternatives.

    Really not trying to defend Google here because… they’re fucking Google, but I’m wondering why the results are so different.

    • FeelzGoodMan420@eviltoast.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      16 days ago

      Same. I also checked the data usage on my phone and google authenticator has used NO mobile data since I’ve had it installed for over a year. So I’m calling bullshit on this article.

      I also do not see nearly as many permissions requested as in that screenshot. It needs photo and video permissions because you can upload qr codes and stuff. Also you can (don’t have to) link it your google account, so obviously it would have access to your google stuff.

  • ASDraptor@lemmy.autism.place
    link
    fedilink
    English
    arrow-up
    0
    ·
    17 days ago

    Shocking! The authenticator from the company which hoards all the data it can get from you and then more, hoards all the data it can get from you and then more!

    Also: discover how the scientists discovered that every 60 minutes, an hour passes.

    More news at 9.