@tychotithonus : thank you for responding. I'm not trying to be aggressive but to make the internet safer.
In your original toot, you wrote: "It's comforting to know that I'm significantly protected from these attempts" while showing phishing messages.
From https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/ (a year ago):
"In the latest Cisco Talos Incident Response Quarterly Trends report, instances related to multi-factor authentication (MFA) were involved in nearly half of all security incidents that our team responded to in the first quarter of 2024".
From my own research I know that the number of phishing-sites is exploding. PhaaS makes it easy to take over accounts where weak MFA is used.
The more people use weak MFA, the more of these sort of attacks we'll be seeing. IOW, the security of weak MFA (TOTP, SMS, number matching) will decrease over time (it does since Alex Weinert wrote this in 2019: https://techcommunity.microsoft.com/blog/microsoft-entra-blog/all-your-creds-are-belong-to-us/855124).
Furthermore, from the page referenced by you, https://meta.wikimedia.org/wiki/Steward_requests/Global_permissions#Requests_for_2_Factor_Auth_tester_permissions:
"Testing this service may result in the loss of your access and is not recommended for inexperienced users."
TOTP effectively means a unique strong (server supplied) password per account that people can impossibly remember. A TOTP app simply is a disguised password manager.
There have been lots of incidents where people lost access to multiple MFA-proteced accounts because they lost access to the shared secrets on their phones. Nobody tells people to make sure that backups are made of such secrets, let alone in a secure and privacy-respecting manner.
Note: a lot of TOTP apps had serious security issues a couple of years ago, as documented by Conor Gilsenan et al. in https://www.usenix.org/conference/usenixsecurity23/presentation/gilsenan (source: https://infosec.exchange/@conorgil/109542074585730853). I doubt that things have significantly improved (Authy was really bad, and at the time, Google's app blocked backups of the shared secrets).
Here's an, IMO, way better advice: use a password manager that checks the domain name. Use it to generate long random passwords, and make sure that it's (encrypted) database is backed up after every change you make.
I wrote about the caveats of password managers in, for example, https://infosec.exchange/@ErikvanStraten/113022180851761038.
Recommending people to use TOTP because they use weak passwords is a bad idea IMO: you effectively make them use a password manager (which a TOTP app is, while it does not check domain names) instead of solving the primary problem: weak passwords.
@conorgil