Why We Built a Local-First iPhone Authenticator Instead of Another Cloud-Synced 2FA App
Most authenticator apps force a flat security model. Every token lives behind the same unlock flow. Every account gets treated as if it has the same value. And if you want stronger protection, the ...

Source: DEV Community
Most authenticator apps force a flat security model. Every token lives behind the same unlock flow. Every account gets treated as if it has the same value. And if you want stronger protection, the answer is often to make everything more cumbersome. We thought that was the wrong tradeoff. We’re a small team building LocalAuth, an open-source iPhone authenticator, and I’m the primary developer behind it. The project started as a small internal experiment, but it kept growing because we wanted to explore a different question: What if a TOTP authenticator used multiple trust boundaries instead of one? That led us to a 3-channel model: Face ID / Secure Enclave for everyday accounts a dedicated YubiKey channel for higher-value accounts a generic FIDO hmac-secret channel for compatible security keys From there, other design choices followed naturally: local-first storage by default nearby encrypted transfer for migration no mandatory account layer for core use an optional self-hostable Travel