Hacker Newsnew | past | comments | ask | show | jobs | submit | alexzeitler's commentslogin

Great tool, using it for several years already.


Yes, but I want to avoid FAANG services




I couldn't find a cloud storage at Hetzner - do you mean their Nextcloud offering?


See:

https://www.hetzner.com/cloud

But if you want just storage:

https://www.hetzner.com/storage/storage-box

Though, I don't know how competitive ~ 50 EUR / month for 20TB is.


Thanks!


„The Software shall be used for Good, not Evil.“


I switched to Firefox two years ago and never looked back.

Don’t even have Chrome installed.


done


Have learned about it this year as well


upstream request timeout when trying to sign in


On our side, Okta is saying the auth is good.

I'm trying my personal account as well and it's telling me MFA isn't set up (it is) and it's making me go through the MFA setup flow again. All attempts to setup another 2FA code in 1Password or to get even an SMS code sent to my phone are failing.

Edit: Personal account with a TOTP 2FA is working again now as well.

This is feeling worse than they're letting on to.


Sign in now worked once and sent me into the MFA setup loop but it failed.


You really should not be using SMS for 2FA.


For my own knowledge, if the options were between using SMS for 2FA or not having 2FA at all then what is better? I've heard mixed things about this.


SMS 2FA is better than no MFA at all, despite the very valid concerns about SMS. It at least protects against credential stuffing and similar automated attacks.


I guess I've always cynically assumed that companies want my phone number to make the data they gather more valuable by making it easier to link with a unique index like a phone number.


Two things can be true at the same time.


Well a simswap attack requires the account password, since otherwise you would not be able to receive an SMS message for the two factor part.

But without two factor, only your account credentials are needed.

So yeah, it's definitely better than nothing, you are effectively forcing your opponent to social engineer your carrier, and doing that generally requires knowing the full number and usually at least your name, if not more identifying information that's harder to get, like social security number or equivalent.

Sure, TOTP or other two factor mechanisms are better because they require access to one of your authenticated devices (assuming the TOTP isn't done by a secure enclave), but SMS two factor is definitely better than disabling two factor.


You really aren't following along closely enough: all other options were failing for me.


But you have setup SMS 2FA enabled, which is convenient this time but a big security hole. You should consider disabling it once the situation comes back to normal.


> But you have setup SMS 2FA enabled

No. I did not. Nor do I now.

I had a TOTP setup in 1Password and Mongo was telling me MFA _wasn't_ set up and sending me through the MFA setup flow again.

All options, SMS included, were failing in that MFA setup flow they pushed me in to.

They're back now and my existing TOTP token is generating one time use passwords that work now.


I bet that's because different parts of their stack disagreed. Obviously a two factor setup should not be acceptable when one is already in place-- if the frontend thought it wasn't but the backend/auth services thought it was, it could explain that.


Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: