TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Google Authenticator cloud sync: Google can see the secrets, even while stored

408 pointsby Signezabout 2 years ago

23 comments

patmccabout 2 years ago
It&#x27;s a tradeoff. They could let (or require) a password be entered to encrypt&#x2F;decrypt it on each device, but then people would be ticked off when they forget their password and can&#x27;t recover their 2FA stuff.<p>They should have handled it the same way they do Sync in chrome, and I expect they will eventually. But, as always, unless a service advertises that it&#x27;s full E2EE <i>and</i> you can verify that, assume it&#x27;s not.<p>One part of this that&#x27;s funny to me:<p>&gt;&gt;&gt;Also, 2FA QR codes typically contain other information such as account name and the name of the service (e.g. Twitter, Amazon, etc). Since Google can see all this data, it knows which online services you use, and could potentially use this information for personalized ads.<p>I guarantee you, Google knows which online services you use in about 800 other ways, it doesn&#x27;t need to scrape it from your 2FA accounts.
评论 #35709982 未加载
评论 #35709889 未加载
评论 #35710721 未加载
评论 #35711590 未加载
评论 #35710240 未加载
评论 #35712513 未加载
评论 #35710790 未加载
nomilkabout 2 years ago
&gt; if someone obtains access to your Google Account, all of your 2FA secrets would be compromised.<p>This overlooks that fact Google itself also has access to your 2FA secrets, which could be even worse considering Google could be requested to peer not just into the user&#x27;s <i>google</i> account, but into accounts they have with other companies&#x2F;organisations too.
评论 #35715337 未加载
评论 #35709420 未加载
评论 #35709389 未加载
评论 #35709439 未加载
ggmabout 2 years ago
It&#x27;s a dual facing problem. Not only do users have no defence against google snooping, but google has no defence against requests to snoop: Apple seems to drive harder to &quot;we&#x27;d help if we could, but we can&#x27;t: to us its just blobs&quot;
评论 #35709405 未加载
评论 #35712566 未加载
soheilproabout 2 years ago
After my phone was stolen last month, I switched to <a href="https:&#x2F;&#x2F;2fas.com" rel="nofollow">https:&#x2F;&#x2F;2fas.com</a> and couldn&#x27;t be any happier.<p>It&#x27;s free, open source and has tons of great features.
评论 #35711496 未加载
评论 #35800421 未加载
评论 #35711533 未加载
评论 #35709616 未加载
评论 #35709965 未加载
Animatsabout 2 years ago
Is there anyone who operates an authentication service which:<p>- Has a contractual obligation to keep your data secure.<p>- Accepts financial responsibility for data compromise.<p>- Carries insurance and bonding to back that responsibility.<p>- Does not require binding arbitration or forbid class actions.<p>- Has their employees bonded in the way bank employees are bonded.<p>Well?
评论 #35710202 未加载
评论 #35710281 未加载
Animatsabout 2 years ago
But all that juicy data they could steal would just be going to waste when they did this.<p>I was really annoyed when iDrive, the backup service, pulled this stunt. Originally, they didn&#x27;t have access to your encryption key. Then they put a dark pattern on their site to encourage users to give them the encryption key, to support the &quot;the Cloud interface&quot;. Then you needed to give them the encryption key for some support functions.
GvSabout 2 years ago
I can recommend Aegis Authenticator - <a href="https:&#x2F;&#x2F;getaegis.app&#x2F;" rel="nofollow">https:&#x2F;&#x2F;getaegis.app&#x2F;</a><p>It has an option for encrypted, automated backups to Google or Nextcloud.
zamnosabout 2 years ago
&gt; <i>likely</i> even while they’re stored on their servers.<p>I&#x27;m all for castigating Google for not encrypting the TOTP seed which is (apparently) transmitted in the clear, but there&#x27;s no actual proof (one way or the other) that the secrets are&#x2F;are not being stored encrypted. Thus claiming &quot;even while stored&quot; claim is a bit much.
评论 #35712270 未加载
eliotteabout 2 years ago
If it is not E2E encrypted, 3-letter agencies can put their tap somewhere in the Google infrastructure.
nucivorousabout 2 years ago
Imagine your google account getting deleted cuz you got banned from Google and the suddenly you lose all your 2FA secrets cuz they are part of that account
评论 #35710959 未加载
ocdtrekkieabout 2 years ago
Someone will, of course, claim Google would never do this, but this presumably would make it trivial for Google itself to log into all of your accounts. In many cases they are already syncing a copy of your passwords.
评论 #35709445 未加载
评论 #35711810 未加载
评论 #35709438 未加载
评论 #35709329 未加载
yrroabout 2 years ago
FreeOTP recently gained support for backups to local file storage or cloud providers. The backups are encrypted with a passphrase, so the cloud provider can&#x27;t obtain your OTP keys.
modelessabout 2 years ago
What? Why would this not get the same end-to-end encryption as Android backups? They&#x27;d have to do extra work to make this less secure.<p>Edit: oh I guess because it supports syncing between Android and iOS? Still lame, they should at least have an option to use the normal Android backup system. Which should have been the default since the start.
评论 #35709802 未加载
Simplicitasabout 2 years ago
Why don’t people use their own TOTP provider, like KeepassXC&#x2F;Strongbox, storing the DB in an encrypted manner on a cloud of their choice.<p>Then use across multiple devices.<p>It took time for this to sync in, so maybe that’s why so many others do not see that there is really no need to have a third party involved in this pattern?
评论 #35721474 未加载
richijabout 2 years ago
I think Mysk just described &quot;sync the secrets to your Google account.&quot; E2E would rather imply that there&#x27;s a second E, but that&#x27;s not the use case here.<p>If you already have a second E, just use the QR export&#x2F;import feature.
throwawaaarrghabout 2 years ago
tl;dr if a hacker gets access to your Google account it&#x27;ll be like you didn&#x27;t have 2FA at all<p>to be fair, storing your 2FA seeds in 1Password is about the same, except 1Password supposedly can&#x27;t see your secrets. but if a hacker gets access to your unlocked 1Password data it&#x27;s the same<p>tl;dr2 use offline TOTP or similar for real 2FA
rurbanabout 2 years ago
Now I wonder if this just a bad netsec beginners mistake (dev, tester, pm all being stupid), or if it&#x27;s unencrypted on purpose? Both options are not thrilling.
sneakabout 2 years ago
TOTP (the six digit codes) is bad and outdated 2FA anyway. It&#x27;s vulnerable to phishing.<p>Use WebAuthn with security keys.
评论 #35709340 未加载
评论 #35709501 未加载
评论 #35709403 未加载
评论 #35709816 未加载
评论 #35709596 未加载
评论 #35709395 未加载
coding123about 2 years ago
Weird no mention of authy
jwrabout 2 years ago
Authy gets this right. Not sure why anyone would trust Google with their 2FA secrets.
评论 #35736941 未加载
评论 #35710984 未加载
nurettinabout 2 years ago
You can just log out in the app to stop the synchronization. Problem solved.
Someone1234about 2 years ago
Can the title get changed?<p>- E2E in this case is nebulous, this isn&#x27;t a chat or email client, it isn&#x27;t client &lt;-&gt; client with Google acting as an intermediary. It is between your Google account&#x2F;Google&#x27;s Server and Google&#x27;s software.<p>- It isn&#x27;t clear if during transportation it is encrypted (e.g. HTTPS?); since seemingly this post isn&#x27;t about that (or if it is the evidence or technical information is lacking). The term &quot;E2EE&quot; typically is referring to encryption from client &lt;-&gt; client through a blind intermediary, but again that doesn&#x27;t describe the relationship here.<p>The actual complaint SEEMS to be:<p>&gt; Google Authenticator backup isn&#x27;t encrypted at rest on Google&#x27;s Servers<p>My big complaint is that this is a misuse of the term &quot;E2E&quot; (E2EE). It simply doesn&#x27;t apply in this situation. That doesn&#x27;t mean it isn&#x27;t discussion worthy (e.g. not using HTTPS is a major red flag, and not encrypting at rest on Google&#x27;s Servers is discussable).<p>In general the linked post doesn&#x27;t do a good job describing what they found and how they found it.
评论 #35709561 未加载
评论 #35709534 未加载
评论 #35709859 未加载
评论 #35709697 未加载
评论 #35709686 未加载
unobatbayarabout 2 years ago
Also, all your private cloud storage photos and data are stored in publicly accessible urls.
评论 #35724116 未加载