Over the past few years, âTwo-step verificationâ has turned into a marketing label. Formally it exists; in practice itâs often useless.
If your account is still protected by SMS or messenger codes, assume you donât really have a second factor at all.
Letâs break down why.
Â
Why SMS is no longer considered protection
SMS is not a security mechanism. Itâs a relic of the telecom era. It was never designed as a secure channel.
Key problems:
1. SIM swapping is not exotic
SIM re-issuance via social engineering is routine. A passport, an âoperator mistake,â or a bit of insider help is often enough.
Result: the attacker gets your number â and your codes.
2. SS7 and telecom infrastructure
Signaling networks were designed decades ago. SMS interception is possible without physical access to your phone.
3. The operator is a single point of failure
Roaming issues, blocks, outages â and you simply canât log into your accounts.
4. No encryption
SMS is stored and transmitted in plaintext. Where, how long, and by whom â you donât control it.
Bottom line: SMS is a convenience factor, not a security factor.
Â
Messengers instead of SMS â even worse
Trying to âupgradeâ SMS by switching to messengers is a classic case of a fake improvement.
To receive six digits, youâre asked to:
- install a heavy app,
- link a phone number,
- hand over metadata,
- depend on internet connectivity,
- trust closed-source code.
This increases the attack surface, not reduces it.
From a security standpoint, itâs pointless.
From a privacy standpoint, itâs actively harmful.
Â
What fundamentally changes with TOTP
TOTP is not a product or a brand. Itâs an open standard (RFC 6238).
The core idea:
đ the code is not delivered â itâs generated locally.
What this means in practice:
- No transmission channel â nothing to intercept
- Offline operation â no dependency on operators or services
- No phone number â less linkage to your identity
- Predictable threat model â cryptography, not âthe cloudâ
The server and your device simply perform the same computation, knowing:
- a shared secret;
- the current time.
They donât communicate. Thatâs the strength.
Â
Important things almost nobody talks about
1. Itâs not the code that protects you, itâs the secret
Six digits are just a representation.
If the secret key leaks, TOTP effectively stops existing.
Which means:
- QR code = the key
- screenshot = potential compromise
- cloud storage = risk
If the secret leaks, reset 2FA immediately. No hesitation.
Â
2. TOTP does not protect against proxy phishing
This is a fundamental limitation of the class.
If:
- you enter the code on a fake site,
- the attacker immediately reuses it on the real one,
TOTP canât help you.
Therefore:
- log in only via bookmarks or a password manager;
- strictly verify the domain;
- no âurgent emailsâ are a reason to enter a code.
Â
3. Backups are not optional â theyâre mandatory
Lost your phone without backup codes â account lost.
The rule is simple:
- write down backup codes;
- store them offline or in a password manager;
- donât rely on âIâll do it later.â
Â
What to use in 2025
Minimum sane choice
- Aegis (Android): open source, local encrypted backups
- Built-in TOTP in iOS / password managers â acceptable
Use with caution
- Google Authenticator with cloud sync
(account compromise = loss of all factors)
Better than TOTP
- WebAuthn / Passkeys / FIDO2
Phishing-resistant by design.
TOTP is the baseline. Passkeys are the next step.
Â
Summary
- SMS is dead as a security factor
- Messengers are marketing disguised as protection
- TOTP is the minimum acceptable level, not an âadvanced optionâ
- The main risks are user discipline, not the algorithm
- The future belongs to phishing-resistant authentication
If a service in 2025 doesnât offer TOTP or WebAuthn, thatâs a red flag â not a âproduct choice.â
Â
P.S.
If youâre explaining this to relatives or non-technical users, make them:
- write down the secret / backup codes,
- remove the phone as the single point of failure.
Otherwise it ends with support tickets, government offices, and lost access.