May 21, 2025
Two‑factor authentication (2FA) has become non‑negotiable for anyone who cares about online safety. TOTP — Time‑based One‑Time Passwords — are the simplest, most widely supported form of app‑based 2FA: you scan a QR code once, the authenticator app and the service share a secret, and your app generates short numeric codes that refresh every 30 seconds. No SMS, no network dependency, and far less vulnerable to interception. If you’re looking for an authenticator to use on macOS, Windows, or mobile, you can find one here.
Okay, quick reality check: not all authenticators are created equal. Some are locked to a single device, some sync keys to the cloud, some encrypt them locally. Your choice should reflect how you balance convenience against risk. For everyday users, a local‑only app that supports encrypted backups is a sweet spot; for power users, hardware keys or apps that let you export and import keys securely are worth considering.

TOTP protects the login process by requiring something you know (your password) and something you have (the rotating code from the app). This blocks basic credential stuffing, password reuse attacks, and casual phishing — though sophisticated phishing that proxies your login may still capture codes in real time. It’s not magic; it’s a strong, pragmatic layer that reduces risk dramatically.
If you’re trying to defend against SIM swap attacks, TOTP is a clear improvement over SMS. If you need protection against advanced targeted attacks (live session hijacking, consenting to a malicious prompt), consider hardware security keys (FIDO2/WebAuthn) in addition to or instead of TOTP.
Prioritize these features, in order:
Examples you’ll hear about: Google Authenticator is simple but historically lacked backups (recent changes added limited features); Authy offers multi‑device sync and encrypted backups (convenient, but consider the cloud tradeoff); Microsoft Authenticator adds account recovery and enterprise integration. Evaluate how much convenience vs control you want.
Step‑by‑step, do it like this:
Important: when you set up a critical account (email, password manager, cloud provider), keep the backup codes somewhere offline until you confirm the authenticator works across your devices or you’ve exported a secure backup. If you lose access without backups, account recovery can be slow and painful.
People obsess over losing their phone — for good reason. Options are:
My bias: I prefer local encrypted backups plus a hardware key for recovery of high‑value accounts. It’s a bit more setup, but it pays off if you ever misplace a device.
Yes — it’s a major improvement over passwords alone and SMS 2FA. For banking and highly sensitive accounts, pair TOTP with a hardware security key if the service supports WebAuthn for the strongest protection.
If you have backup codes or an exported encrypted backup, you can recover access. Without backups, you’ll need to go through the service’s recovery process, which can be slow and sometimes requires identity verification. Prepare ahead to avoid headaches.
Some apps allow multi‑device syncing or encrypted backups, others don’t. If you want multiple devices, choose an authenticator that explicitly supports that. Otherwise export/import the keys securely when you change devices.