Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Dave Royal Newsgroups: comp.mobile.android Subject: Re: Codes sent by text message Date: Wed, 13 Mar 2024 19:45:45 +0000 (GMT) Organization: news.eternal-september.org Lines: 15 Message-ID: References: <1mtd3l3os6odg.dlg@v.nguard.lh> <1fuj8a8wvjzts$.dlg@v.nguard.lh> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Injection-Date: Wed, 13 Mar 2024 19:45:46 -0000 (UTC) Injection-Info: dont-email.me; posting-host="502928e1e6f66acd8ea6f591df40f94e"; logging-data="1185682"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+3djK/uxTXJ6EnDazUyi4B" Cancel-Lock: sha1:X2qsNnjVXtD64Hi5YJfCTG8NkRc= X-Newsreader: Mod.PiaoHong.Usenet.Client:2.02.M16 Bytes: 1778 Anssi Saari Wrote in message: > More reading, there's a script decrypt.py in the docs directory of > Aegis' Github which apparently can be used to decrypt the vault as > well. I don't know what format that produces or if it can be imported by > other tools. I should try that, obviously. Obviously! But I hadn't actually tried decrypting an andOTP backup. So I did, on Linux, using this: https://github.com/asmw/andOTP-decrypt It produces a set of QR code image files. -- Remove numerics from my email address.