Replies: 1 comment 1 reply
-
|
I've seen this being mandated in more orgs lately. I think it's important because many maintainers have access to a lot of projects and so this is contributing to the overall security in FOSS. Additionally, SMS is inaccessible and problematic in so many ways that it's almost the same as not having 2FA at all. It creates a false sense of security while texts can be easily intercepted. FWIW, I don't really consider SMS a 2FA mechanism. It doesn't ensure that the second factor is held by the account owner. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Today, I clicked on a GitHub email for cherrypy intending to respond to an issue. It took me to a page where I was not allowed to proceed because my account was configured with 2FA but including SMS, which is considered insecure. In my opinion, SMS isn't insecure, it's just less secure than other 2FA methods.
My instinct - CherryPy isn't of such high importance that it requires only the highest level of security and simply requiring 2FA is sufficient.
I've removed SMS as an option for 2FA in my account so I can read and respond to issues and file discussions like this one, but I'm uncertain what the implications might be. I guess it's probably fine, but do we really want to hold contributors to this high bar when much more visible projects do not?
Beta Was this translation helpful? Give feedback.
All reactions