I just found it by typing Battle and it was the very top choiceQuote:
Originally Posted by 'merujo',index.php?page=Thread&postID=190802#post1 90802
Printable View
I just found it by typing Battle and it was the very top choiceQuote:
Originally Posted by 'merujo',index.php?page=Thread&postID=190802#post1 90802
I found it under Blizzard Entertainment in the App store.
Probably giving it away for free because less account restores = less people required to do account restores and saves them money in the long run. I wouldn't be surprised to see authenticators in some form mandatory down the the line.
I don't lose phones, especially ones I paid $200 for. :)Quote:
Originally Posted by 'Fursphere',index.php?page=Thread&postID=190648#po st190648
I'm looking into the app, before I activate it, I have an e-mail in to find out what you'd need to do if your phone breaks or is lost or stolen (probably the same thing as when people are keylogged - prove it's your account, blah blah blah). Replacing the app is easy, just redownload it, but in the case of a stolen phone, obviously that means attaching a new app, and I'd like to know how that works.
I'm not worried about my phone being stolen, I use the iPhone so much, I always know where it is, and I don't leave it anywhere unattended. My office is a secure one that requires a keycard to get into, and I never leave it in the car.
I'm surprised there's not a Blackberry version of this app, along with the iPhone app. Or one for the G1.
I got it and it's ubr ~
I cannot even find the Authenticator listed in the Blizzard Store anymore.
It used to show up as not available or out of stock most of the time.
Not sure if Blizzard is phasing the physical product out for this alternative.
Over/under on when someone breaks the algorithm and encryption that generates auth codes now it's in easily available software?
I am putting the line at 2 months.
The algorithm is tied to the serial number printed on each. Even if they break it they need to know what serial your authenticator is. If there are only 10-20 different serials (and they knew them all) maybe they could brute force through the code. Software authenticator might be different and not have multiple serials, in that case it would suck.
Not to laugh at Fur's misfortune, but the thought of a Raimi-cam perspective of someone breaking into a car and stealing an iPod and a copy of Evil Dead just made me chuckle.
The algorithim is public for the physical devices. The important part is the private key...Quote:
Originally Posted by 'railz',index.php?page=Thread&postID=190958#post19 0958
Either way you'll need physical access to the device or serial to get it :)