Replies: 1 comment 1 reply
-
You need to be able to use the original key to verify if the TOTP is correct. The main point is that, if someone could gain access to your database, they probably also could extract that key to decrypt the data. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I noticed that 2FA keys are stored unencrypted in the twofactor table, which could pose a security risk if the database is compromised.
I was wondering if the same design choice exists in the upstream Bitwarden implementation.
Thanks
Beta Was this translation helpful? Give feedback.
All reactions