Tag: authentication

  • Proton Unveil New Two Factor Authentication App

    Proton Unveil New Two Factor Authentication App

    Proton Unveils New Two-Factor Authentication App

    Proton known for its commitment to privacy and security, has just released a dedicated app for two-factor authentication (2FA). This new app provides users with an additional layer of security to protect their online accounts.

    Enhanced Security with Proton 2FA

    The new Proton 2FA app generates time-based one time passwords (TOTP) adding a crucial step beyond just usernames and passwords. When you enable 2FA on a supported service and link it to Proton 2FA the app provides a unique code that you must enter along with your password to log in.

    • Stronger Protection: 2FA significantly reduces the risk of unauthorized access to your accounts.
    • Easy to Use: The app is designed for simplicity making it easy for anyone to set up and use 2FA.
    • Compatibility: Works with any service that supports TOTP-based authentication.

    How Proton 2FA Works

    1. Download and install the Proton 2FA app from your device’s app store.
    2. In the service you want to protect navigate to the security settings and enable two-factor authentication.
    3. Next scan the QR code provided by the service using the Proton 2FA app, or manually enter the secret key.
    4. Once set up the app will generate a unique code every few seconds. Simply enter this code along with your password when logging in to complete the authentication process.

    Why Choose Proton’s 2FA App?

    Proton’s strong reputation for prioritizing user privacy and security makes its 2FA app a highly trustworthy choice. Unlike many other 2FA solutions Proton emphasizes the following core principles:

      Staying Secure in a Digital World

      Proton recently released Proton Authenticator a cross-platform 2FA app. It runs on Windows macOS Linux iOS and Android. The app works as a secure alternative to Google Authenticator or Microsoft Authenticator. All About Cookies

      Unlike many alternatives it’s open source ad free and offers secure encrypted sync across devices. Moreover you can import existing 2FA codes from apps such as Google LastPass Microsoft or Bitwarden. If needed you can also export them later giving you complete flexibility and control.

      Core Features That Stand Out

      • Furthermore: secure encrypted cloud sync keeps your codes accessible across all your devices.
      • Offline support: Use the app without internet access codes work even when you’re offline.
      • Conveniently: it offers full import export support making it easy to transition from other 2FA tools.
      • Importantly: it’s privacy first no ads no tracking and no vendor lock in.
      • Additionally: it’s always free open source and completely free across all platforms.

      Why It Matters for Security

      Proton’s reputation for prioritizing user privacy and security makes its 2FA app a trustworthy choice. In contrast to many other 2FA solutions Proton emphasizes:

      It also gives you full ownership and control of your codes. Whether you choose encrypted sync or local only storage you decide where your data lives and who can access it. Consequently that level of transparency makes it more trustworthy than many mainstream apps.

      Integrates with Proton Pass Authentication Too

      Proton’s password manager Proton Pass already includes built in 2FA support. However if you prefer a standalone solution especially to secure your Proton account login Proton Authenticator provides a clean focused alternative.

      For Proton Pass users FIDO2 based 2FA is also available. Specifically you can use hardware security keys like YubiKey or platform based methods such as Touch ID and Windows Hello. This combination offers added flexibility and strong security.

    • Better Auth Secures $5M Funding From Peak XV,

      Better Auth Secures $5M Funding From Peak XV,

      Better Auth: Ethiopian Developer’s Tool Gains $5M Investment

      Better Auth, an innovative authentication tool developed by a self-taught Ethiopian developer, recently secured $5 million in funding. Peak XV Partners and Y Combinator (YC) co-led the investment, signaling strong confidence in the platform’s potential.

      Investment Details

      Better Auth Secures $5M Seed Round Led by Peak XV & YC 🚀

      Better Auth raised a $5 million seed round, co-led by Peak XV Partners and Y Combinator. The round also included support from P1 Ventures, Chapter One, and key angel investors shega.co

      Consequently, the funding will help Better Auth scale its authentication services and expand globally.

      What This Funding Enables

      • Robust infrastructure: The capital will support tools like SMS and email authentication, global session storage, and fraud protection techcrunch.com
      • Team growth: Better Auth plans to hire and build faster while widening its talent pool .
      • Enterprise layer: They aim to launch a paid add-on over their successful open-source framework linkedin.com

      Why It Matters

      First, this marks Peak XV’s first direct investment in an African founder—a major milestone for the continent’s tech ecosystem .

      Second, it highlights rising global demand for strong authentication tools. Better Auth already powers AI startups and GitHub projects, and earns praise for being dev‑friendly and flexible .

      Spotlight on the Founder

      Founder Bereket Engida built Better Auth from Ethiopia. He started coding at age 18, launched the library in late 2024, and by June 2025, amassed 150K+ weekly downloads, 15K+ GitHub stars, and a 6K-member Discord community—all before moving to Silicon Valley finance.yahoo.com

      Authentication Tool Explained

      Better Auth delivers streamlined authentication for web and mobile apps. It offers a clean, intuitive interface. It also provides strong security features for developers.

      Why Developers Choose Better Auth

      First, it supports email/password, social login (GitHub, Google, Discord, Twitter), two‑factor auth, and multi‑tenant systems—all with minimal setup reddit.combetterstack.com

      In addition, it’s framework‑agnostic. Use it with React, Vue, Svelte, Next.js, Nuxt, Astro, Solid, Hono, and more .

      Plus, it uses full TypeScript type safety. Developers get auto-generated schemas and a simple, type‑stable API .

      Built-In Security You Can Trust

      • Rate‑limiting, CSRF protection, and password policies come pre‑configured avishka.dev
      • Two‑factor authentication and plugin-based multi-session support help secure accounts at scale .

      Developer Praise & Community Feedback

      According to Reddit, “Betterauth is fantastic…” and scales well with tens of thousands of daily users .

      On Hacker News, users applaud the team’s fast response to security issues and flexibility:

      “This library is so much more flexible… community leadership, responsiveness, and development speed has been incredible.” news.ycombinator.com

      Real-World Usage

      Developers report using Better Auth in production across dozens of apps—like SaaS UIs, internal dashboards, and AI tools—on frameworks like Next.js, Hono, Astro, Bun, SvelteKit, and more youtube.com

    • Bluesky to Verify Notable Users: Latest Updates

      Bluesky to Verify Notable Users: Latest Updates

      Bluesky to Verify ‘Notable’ Users

      Bluesky, the decentralized social media platform, has officially launched its verification program for “notable and authentic” users. This initiative aims to enhance trust and reduce impersonation on the platform.WIRED

      🔹 New Verification System

      As of May 22, 2025, users can apply for verification through an online form. To qualify, accounts must be active, secure, authentic, and notable. This move marks a shift from Bluesky‘s earlier self-verification method, which involved linking a domain to one’s username .Bluesky

      🏛️ Trusted Verifiers

      In addition to individual verification, organizations can apply to become “Trusted Verifiers.” These entities, such as The New York Times and Wired, have the authority to verify other users on the platform. Accounts verified by these organizations will display a scalloped blue checkmark, distinguishing them from those verified directly by Bluesky .Wikipedia

      🔍 Transparency and Control

      Users can tap on a verified badge to see which organization granted the verification. Additionally, there’s an option to hide verification badges through the app’s settings, offering users control over their profile’s appearance .BlueskyThe Verge

      🧠 Community Feedback

      While the verification system aims to bolster authenticity, some users express concerns about potential status hierarchies reminiscent of legacy platforms. Bluesky addresses this by maintaining its domain-based self-verification method, allowing users to verify their identity without a blue badge .The Verge

      📌 How to Apply

      Interested users and organizations can apply for verification or Trusted Verifier status by filling out the form available on Bluesky‘s official blog.

      Why Verification Matters

      Verification is crucial for social media platforms. It helps users distinguish genuine accounts from fake ones, thereby improving trust and safety. Bluesky‘s decision to verify notable users is a step towards creating a more reliable environment for its community.

      What to Expect

      Here’s what you can anticipate from this update:

      • Enhanced Authenticity: Verified badges will help users identify authentic accounts of public figures, journalists, and other notable individuals.
      • Reduced Impersonation: The verification process will make it harder for impersonators to create fake accounts and mislead users.
      • Improved Trust: A verified platform can foster greater trust among users, encouraging more meaningful interactions and discussions.

      The Verification Process

      While Bluesky hasn’t released comprehensive details about its verification process, it’s likely to involve verifying the identity of users through official documentation or other reliable means.

      More Information

      Stay tuned for further updates from Bluesky as they roll out this new verification system. It is expected that more details about the eligibility criteria and application process will be available soon.