![](/static/253f0d9/assets/icons/icon-96x96.png)
![](https://lemmy.dbzer0.com/pictrs/image/a18b0c69-23c9-4b2a-b8e0-3aca0172390d.png)
8·
1 year agoIs that some sort of ISP-level block?
Sounds like you need a VPN.
Is that some sort of ISP-level block?
Sounds like you need a VPN.
I don’t mean that it’s not old, I mean that it’s still got some more room for improvement. Passkeys, for instance, are an attempt at improving the user experience.
It still defends against one failure mode (the website gets hacked but you’re ok) but yeah, obviously if you get hacked and the hacker knows how to get your vault out then you’re 100% screwed.
My suggestion is always hardware 2FA, even though it’s not as mature as the other systems. Personally I have two Yubikeys (in case one breaks/gets lost) but it does mean that I need to add TOTPs to both of them each time I add a new 2FA.
My old work actually ran into some issues because they couldn’t see DMs/private channels.
Maybe this is a cloud vs. self-hosted thing? It’s been a few years since I’ve worked there though.