Path: ...!weretis.net!feeder6.news.weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Anssi Saari Newsgroups: comp.mobile.android Subject: Re: Codes sent by text message Date: Wed, 13 Mar 2024 12:03:37 +0200 Organization: An impatient and LOUD arachnid Lines: 16 Message-ID: References: <1mtd3l3os6odg.dlg@v.nguard.lh> <1fuj8a8wvjzts$.dlg@v.nguard.lh> MIME-Version: 1.0 Content-Type: text/plain Injection-Info: dont-email.me; posting-host="452b2e407ccdfd2eb884f92dc69f77cc"; logging-data="955379"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+vR3dz7qm4R+RI8q3PUIvy" User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) Cancel-Lock: sha1:n68KLNqRRLYYSmuAHD4bojUj9bE= sha1:SWpaHhI7McTcF2U5i1iWkBfxC2U= Bytes: 1938 Dave Royal writes: > I see that Aegis can produce an encryted copy of it's 'vault'. Do > you know if the tokens therein be recovered without using Aegis > itself ? Looks like an OTPClient dev asked about importing an Aegis encrypted backup in https://github.com/beemdevelopment/Aegis/issues/902 and from their project page at https://github.com/paolostivanin/OTPClient/ they support that now. So at least OTPClient has the required support. More reading, there's a script decrypt.py in the docs directory of Aegis' Github which apparently can be used to decrypt the vault as well. I don't know what format that produces or if it can be imported by other tools. I should try that, obviously.