toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#freeotp

0 posts0 participants0 posts today
itsFriday<p><span class="h-card" translate="no"><a href="https://toot.community/@thesweetcheat" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>thesweetcheat</span></a></span> Not sure if it is the exact same server software, but at my work place I also need MFA and instead of the told Microsoft app I use <a href="https://toot.community/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a>+ and it works.<br>Maybe worth a try.</p>
mgorny-nyan (he) :autism:🙀🚂🐧<p>The history of my phones: <a href="https://social.treehouse.systems/tags/Motorola" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Motorola</span></a> ROKR E6 (running MontaVista Linux) → moto e(2) → moto G6 (stock <a href="https://social.treehouse.systems/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> → <a href="https://social.treehouse.systems/tags/LineageOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LineageOS</span></a>) → <a href="https://social.treehouse.systems/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Pixel 8a (<a href="https://social.treehouse.systems/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a>). Why the change? Well, <a href="https://social.treehouse.systems/tags/Lenovo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lenovo</span></a> is killing Motorola brand for years now.</p><p>A few thoughts after the first day using it, and comparing it to 5 year old Motorola with barely working software:</p><p>1. Pixel: 7 years software updates + good alternatives. Motorola: 2 years + poorly working LineageOS port, whose support just ended. You could say you either pay directly to Google, or you buy competition and pay in your data.</p><p>2. It made me think of "value" moto e(2) — no charger, not even a back cover, but there's Gorilla Glass and good hardware. Well, except that the price isn't "value".</p><p>3. It's not really pretty, I'm going to need to find a case to even out the back. Moto G6 was a piece of art compared to it.</p><p>4. It didn't reboot of its own accord even once yet. Moto G6 rebooted at least daily.</p><p>5. You can call more than once. Moto G6 used to hang after a single call — you couldn't make or receive another one, and it drained the battery.</p><p>6. Location catches in a few seconds, compared to a few minutes of standing still with Moto G6, in good weather.</p><p>7. Data transfer was successful. It's much easier when you're doing it across phones, rather than from backups. Even Matrix and <a href="https://social.treehouse.systems/tags/GadgetBridge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GadgetBridge</span></a> didn't cause any issues.</p><p>8. Restore in <a href="https://social.treehouse.systems/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> doesn't work. Fortunately, during the last migration I've backed up all the secrets externally.</p><p>9. The fingerprint reader in the screen is usable, and I'm getting the hang of gesture navigation. However, the under-screen fingerprint reader + navigation in Moto G6 was just brilliant. I still couldn't find any convenient way of locking the screen.</p><p>10. Performance and RAM is much better. It just doesn't keep killing the apps I'm using.</p><p>11. I haven't tested the screen in the sunlight yet, but I suspect it's going to be better. G6 was pretty horrible, even compared to the value e(2).</p><p>12. The government mObywatel app is working. Just saying.</p><p>13. Multiling O keyboard sometimes shows under the bottom "keyboard control" bar, sometimes above it — very annoying.</p>
Ch M[ae][iy]e?r 🇪🇺 🖤 🤍<p><span class="h-card" translate="no"><a href="https://amt.social/@BjoernBeck" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BjoernBeck</span></a></span> gab es da nicht ein fettes <a href="https://digitalcourage.social/tags/Antifeature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Antifeature</span></a> bei <a href="https://digitalcourage.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a>, weshalb man lieber den Fork <a href="https://digitalcourage.social/tags/FreeOTPplus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTPplus</span></a> verwenden möchte? 🤔<br>Das mag so zwei oder drei Jahre her sein, ...</p>
ʙwɑnɑ нoɴoʟʊʟʊ :kverified:<p><span class="h-card" translate="no"><a href="https://writing.exchange/@vantablue" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vantablue</span></a></span> I've been using <a href="https://discordian.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> (available on F-Droid) for a few months now, seems just simple and clean, never had any trouble. Don't know about your requirements etc. of course.</p>
Todd Knarr<p>Switching from <a href="https://mstdn.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Authenticator on my phone to <a href="https://mstdn.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a>. GA's started not updating TOTP codes when opened if you aren't backing them up to their servers, which I'm not about to do. Something about time sync, which is BS.</p>
Stéphane Bortzmeyer<p>Quelque chose qu'on a : ça peut être de la crypto symétrique (protocole <a href="https://mastodon.gougere.fr/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a>, l'oratrice utilise <a href="https://mastodon.gougere.fr/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> sur son malinphone) </p><p>Pour illustrer SHA-1, il y a une image de 🐈 </p><p><a href="https://mastodon.gougere.fr/tags/ParisWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ParisWeb</span></a></p>
Jörg :fedora:<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@kaffeeringe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kaffeeringe</span></a></span> Gebe dir grundsätzlich Recht, aber zumindest in Verbindung mit meinem Arbeitsaccount funktioniert sie auch ohne Standort-Berechtigung.</p><p>Alternative zu <a href="https://social.tchncs.de/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a>+ kann auch <a href="https://social.tchncs.de/tags/Aegis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aegis</span></a> sein (F-Droid).</p>
Steffen Voß<p>Der <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Authenticator hat seit Jahren einen Bug, der dazu führt, dass alte Zugangsdaten gelöscht werden, wenn man neue hinzufügt. </p><p>Viel grundsätzlicher finde ich problematisch, dass die Android App dauerhaft im Hintergrund den Standort trackt. Nutzt <a href="https://social.tchncs.de/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a>+</p><p><a href="https://www.csoonline.com/article/3480918/design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/3480918/</span><span class="invisible">design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out.html</span></a></p>
Karl Voit :emacs: :orgmode:<p>Has anybody successfully converted his/her <a href="https://graz.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> (2.x) <a href="https://graz.social/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a> entries to <a href="https://graz.social/tags/Aegis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aegis</span></a>? </p><p><a href="https://github.com/beemdevelopment/Aegis/issues/1084" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/beemdevelopment/Aeg</span><span class="invisible">is/issues/1084</span></a> reads like there is no chance at all at the moment ... 🤔 </p><p>FreeOTP only exports into its xml files where I could not find a conversion tool to any input file format for Aegis so far.</p><p><a href="https://gitlab.com/stavros/freeotp-to-andotp-migrator" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.com/stavros/freeotp-to-</span><span class="invisible">andotp-migrator</span></a> fails</p><p><a href="https://github.com/half-duplex/freeotp-export" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/half-duplex/freeotp</span><span class="invisible">-export</span></a> is just a parser, not something that writes a format itself</p>
Karl Voit :emacs: :orgmode:<p>Millions Of <a href="https://graz.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a>, <a href="https://graz.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a>, <a href="https://graz.social/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> <a href="https://graz.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> Security Codes Leak Online <a href="https://www.forbes.com/sites/daveywinder/2024/03/04/millions-of-google-whatsapp-facebook-2fa-security-codes-leak-online/?sh=708c2f2774d1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">024/03/04/millions-of-google-whatsapp-facebook-2fa-security-codes-leak-online/?sh=708c2f2774d1</span></a></p><p><a href="https://graz.social/tags/PIN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PIN</span></a> via <a href="https://graz.social/tags/SMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMS</span></a> (or <a href="https://graz.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a>) is a stupid idea anyway.</p><p>Best case: <a href="https://graz.social/tags/FIDO2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIDO2</span></a> hardware tokens. Well invested ~20-50€.</p><p>If you can't, use <a href="https://graz.social/tags/PassKeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PassKeys</span></a> if you absolutely trust the service provider.</p><p>Both protect against phishing.</p><p>If not, use a trustworthy <a href="https://graz.social/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a> app (<a href="https://graz.social/tags/GoogleAuthenticator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleAuthenticator</span></a> is NOT trustworthy any more!) like: <a href="https://graz.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> <a href="https://graz.social/tags/Aegis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aegis</span></a></p><p>Other 2FA methods are more or less insecure.</p><p><a href="https://graz.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://graz.social/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a></p>
Karl Voit :emacs: :orgmode:<p>Wie man eine vertrauenswürdige Authentifizierungs-App auswählt<br><a href="https://www.karl-voit.at/2023/03/05/TOTP-Auswahl/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">karl-voit.at/2023/03/05/TOTP-A</span><span class="invisible">uswahl/</span></a></p><p>... mit einer deutlichen Warnung vor dem <a href="https://graz.social/tags/GoogleAuthenticator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleAuthenticator</span></a>! </p><p><a href="https://graz.social/tags/publicvoit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>publicvoit</span></a> <a href="https://graz.social/tags/Authenticator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticator</span></a> <a href="https://graz.social/tags/FIDO2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIDO2</span></a> <a href="https://graz.social/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a> <a href="https://graz.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> <a href="https://graz.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://graz.social/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheit</span></a></p>
Dr. Øhm<p>Wollte mich nach einem Handywechsel vom Google Authenticator lösen und habe mir <a href="https://drohm.eu/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> heruntergeladen. <br>Leider kann ich hier kein Backup erzeugen und nach einer kurzen GitHub Suche ist das wohl auch nicht geplant. Würde das gerne parallel auf iPad und iPhone nutzen, so wie den Google Authenticator auch. </p><p>Kennt wer Alternativen?</p>
Anarchozionist/Datenprolet<p><a href="https://chaos.social/tags/Github" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Github</span></a> nutzt 80-Bit Keys für TOTP-Token, damit die mit alten Versionen vom <a href="https://chaos.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Authenticator kompatibel sind. Das führt dazu, dass die Android-App <a href="https://chaos.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> den Token beim Erstellen als "unsicher" markiert, weil er nicht mindestens 128-Bit hat.<br>Großartig, wie zwei Multi-Milliarden-Unternehmen die Sicherheit eines offenen Standards mit Abwärtskompatibilität unterminieren.</p><p><a href="https://github.com/orgs/community/discussions/75936#discussioncomment-7727594" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/orgs/community/disc</span><span class="invisible">ussions/75936#discussioncomment-7727594</span></a></p>
Karl Voit :emacs: :orgmode:<p><span class="h-card"><a href="https://emacs.ch/@brokenix" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>brokenix</span></a></span> Yes of course.</p><p>Two months ago I even wrote an article on how to choose an auth tool but it's in German: <a href="https://karl-voit.at/2023/03/05/TOTP-Auswahl" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">karl-voit.at/2023/03/05/TOTP-A</span><span class="invisible">uswahl</span></a></p><p>I currently use <a href="https://graz.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> and I've read good things about <a href="https://graz.social/tags/Aegis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aegis</span></a>: <a href="https://karl-voit.at/apps-I-am-using/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">karl-voit.at/apps-I-am-using/</span><span class="invisible"></span></a></p><p>The point of the story is not that <a href="https://graz.social/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a> is a bad idea!</p><p>My point is that you should avoid the <a href="https://graz.social/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> for anything that needs to be secure: <a href="https://karl-voit.at/cloud-data-conditions/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">karl-voit.at/cloud-data-condit</span><span class="invisible">ions/</span></a> and <a href="https://karl-voit.at/cloud/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">karl-voit.at/cloud/</span><span class="invisible"></span></a></p><p>And <a href="https://graz.social/tags/GoogleAuthenticator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleAuthenticator</span></a> is only one app that provides TOTP out of many. <a href="https://graz.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a></p>
Nordnick :verified:<p><span class="h-card"><a href="https://500.social/@daj" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>daj</span></a></span> </p><p><a href="https://norden.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a>+</p>
Rob McBryde<p>Re-post: Increasing online security with 2-factor authentication</p><p>I've been working on some tech guidelines for my church and beefing up my processes for securing my online footprints. In this post, I share what 2FA is and why and how to use it as part of your everyday online routines.</p><p><a href="https://fosstodon.org/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://fosstodon.org/tags/YubiKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKey</span></a> <a href="https://fosstodon.org/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> <a href="https://fosstodon.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://fosstodon.org/tags/onlinesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>onlinesecurity</span></a></p><p><a href="https://robmcbryde.com/increasing-online-security-with-2fa" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">robmcbryde.com/increasing-onli</span><span class="invisible">ne-security-with-2fa</span></a></p>
Senna 🌷<p>Today I switched my authenticator app from Authy to <a href="https://mindly.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> because the former has sketchy telemetry and the latter is FOSS and made by Red Hat. I also added more of my accounts to the app. Better <a href="https://mindly.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://mindly.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a>!</p>
dreamchipper<p>Ich experimentiere weiterhin mit der <a href="https://bildung.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> in <a href="https://bildung.social/tags/Nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nextcloud</span></a>.</p><p>Dank eurer Hinweise <a href="https://bildung.social/tags/fedilz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedilz</span></a> konnte ich für mich selbst auch <a href="https://bildung.social/tags/1Password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1Password</span></a> nutzen, um den zweiten Faktor nicht in <a href="https://bildung.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> sondern in 1Pasword zu hinterlegen. </p><p>Am <a href="https://bildung.social/tags/Mac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mac</span></a> füllt dann 1Password erst meine Anmeldedaten und dann automatisch den zweiten Faktor aus. <br>Das ist schon nice!</p><p><a href="https://support.1password.com/one-time-passwords/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.1password.com/one-time</span><span class="invisible">-passwords/</span></a></p>
dreamchipper<p>Nutzt jemand die Zweifaktorauthentifizierung <a href="https://bildung.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> in <a href="https://bildung.social/tags/nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nextcloud</span></a>? </p><p>Ich möchte das gerne für unsere <a href="https://bildung.social/tags/Schule" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schule</span></a> umsetzen, bin aber nicht ganz sicher, welche Nachteile das z.B. in Bezug auf Nutzung von mobilen Apps oder sonstigen mir noch gar nicht bekannten Punkten nach sich ziehen könnte.</p><p>Wir nutzen für <a href="https://bildung.social/tags/moodle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>moodle</span></a> bereits die <a href="https://bildung.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a>. <br>Dabei kommt die App <a href="https://bildung.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> zum Einsatz.<br><a href="https://freeotp.github.io/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">freeotp.github.io/</span><span class="invisible"></span></a><br>Gibt es hierzu Erfahrungen, ob sich die gleiche App auch beo <a href="https://bildung.social/tags/nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nextcloud</span></a> nutzen lässt?</p><p><a href="https://bildung.social/tags/fedilz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedilz</span></a></p>
Norbert Tretkowski<p><span class="h-card"><a href="https://systemli.social/@anneroth" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>anneroth</span></a></span> <a href="https://gruene.social/tags/FreeOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeOTP</span></a> von <a href="https://gruene.social/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a>. Weil es unter einer freien Lizenz steht, unter Android schon problemlos funktioniert und vor kurzem, nach zugegeben langer Pause, ein großes Update erhalten hat.</p>