ultra

@ultra@kbin.social
1 Post – 3 Comments
Joined 11 months ago

This is an easy one.

The entire privacy policy of Aegis:

Aegis Authenticator does not collect any data from your device.

  • Camera access is only used for scanning QR codes.

If you believe this policy has been violated, please let us know.

Relevant parts of Authy's privacy policy:

We use that phone number to identify you, to provide you 2FA services, and to maintain logs for security and anti-fraud purposes.

We may also send notices about Twilio products or events to you, but you may click on the unsubscribe link that will appear at the bottom of any of our marketing emails or you can contact customer support to opt out.

Device Information. When you download and open the Authy desktop or mobile app, we automatically collect information about the type of device you have downloaded the app on and your device identifier.

Login History and Authy Account History. When you use an Authy token to log into an account, whether the token was generated on the app or one sent to you via your phone number, we collect and keep information associated with your login activity including information like your IP address, what application you logged in to, that you logged in, and when. If you change your phone number or email associated with your Authy account, we will also keep a log of that.

Geolocation information. If you have location services turned on, we collect your location based on your IP address.

How we share personal data. In general, Authy shares personal data in the same way Twilio does (see How Twilio shares personal data for more).

From "How Twilio shares personal data": However, we do need to share it in some circumstances. These may be to provide you services (e.g., to route a call or send an email), or when necessary for our suppliers to provide services to us, or for another reason listed here, or share personal data for cross-context behavioral advertising.

However, Authy users should be aware that an application that integrates with the Authy 2-Factor API can access your phone number, email address, and user name. It will also be able to access your primary device type and information associated with your login activity to that application. It may also retain this information on its own servers. We may also share other information related to your account with that application to help them and us detect suspicious or fraudulent activity on your account.

1 more...

A compromise is this OpenBoard fork by Helium314 which is able to use Google's proprietary gesture typing library, which can be downloaded and loaded manually if you want to enable it. It's still a privacy improvement over using Gboard.

Walmart has a $20 Android TV streaming device that makes a good substitute. The Verge gave it an 8/10. Works great for Stremio and other Android TV apps.