How to pick and protect an authenticator: TOTP, Microsoft Authenticator, and real-world trade-offs Read more