Frequently Asked Questions

Find answers to common questions about TOTP generators and two-factor authentication

TOTP Basics

What does TOTP stand for and what is it?

TOTP stands for "Time-Based One-Time Password." It's a security algorithm that generates unique, temporary passwords that change every 30 seconds. TOTP is widely used for two-factor authentication (2FA) to add an extra layer of security to your online accounts.

Unlike static passwords, TOTP codes are only valid for a short time window, making them extremely secure even if intercepted by attackers.

How is TOTP different from SMS-based 2FA?

TOTP offers several advantages over SMS-based 2FA:

  • Works offline: No cellular or internet connection required
  • More secure: Not vulnerable to SIM swapping or SMS interception
  • Faster: Instant code generation without waiting for text messages
  • More reliable: No dependency on carrier networks or signal strength
  • Private: No phone number sharing with services
Which apps support TOTP authentication?

Most major online services support TOTP, including:

  • Social Media: Facebook, Twitter, Instagram, LinkedIn, Reddit
  • Cloud Services: Google, Microsoft, Dropbox, iCloud
  • Financial: Most banks, PayPal, cryptocurrency exchanges
  • Developer Tools: GitHub, GitLab, AWS, Azure
  • Gaming: Steam, Battle.net, Epic Games
  • Productivity: Slack, Discord, Zoom, Atlassian

Setup & Configuration

How do I set up TOTP for my accounts?

Setting up TOTP typically follows these steps:

  1. Go to your account's security or 2FA settings
  2. Choose "Authenticator app" or "TOTP" option
  3. Scan the QR code with your authenticator app or manually enter the secret key
  4. Enter the 6-digit code from your app to verify setup
  5. Save the provided backup codes in a secure location

Pro Tip: Always save your backup codes and consider storing the secret key securely for account recovery purposes.

What authenticator apps do you recommend?

Popular and reliable authenticator apps include:

  • Google Authenticator: Simple, widely supported
  • Authy: Cloud backup, multi-device sync
  • Microsoft Authenticator: Integrated with Microsoft services
  • 1Password: Built into password manager
  • Bitwarden: Open source with premium features
  • LastPass Authenticator: Free with backup options

Choose based on your needs for backup, sync, and integration with other tools.

Can I use the same secret key on multiple devices?

Yes, you can use the same secret key on multiple devices, and they will all generate identical TOTP codes. This is useful for:

  • Having backup devices in case your primary device is lost
  • Using TOTP on both phone and computer
  • Sharing access in team environments (though this reduces security)

Security Note: Each additional device with the secret key increases your attack surface. Only add the key to devices you fully control and trust.

Troubleshooting

My TOTP codes aren't working. What should I do?

Common solutions for non-working TOTP codes:

  • Check time sync: Ensure your device clock is accurate (TOTP is time-sensitive)
  • Wait for new code: Don't use codes at the very end of their 30-second window
  • Verify secret key: Make sure you entered the correct secret key
  • Check settings: Confirm you're using 6 digits and 30-second intervals
  • Try previous/next code: Some services accept codes from adjacent time windows
  • Use backup codes: If nothing else works, use your saved backup codes
I lost my phone with my authenticator app. How do I recover access?

Recovery options depend on your preparation:

  • Backup codes: Use the backup codes you saved during TOTP setup
  • Alternative device: If you set up TOTP on multiple devices
  • Cloud backup: Some apps like Authy offer cloud recovery
  • Account recovery: Contact support with identity verification
  • Saved secret keys: If you stored the original secret keys securely

Prevention: Always save backup codes and consider using an authenticator app with cloud backup features for easier recovery.

Why are my TOTP codes always a few seconds behind?

Time synchronization issues can cause TOTP codes to appear out of sync:

  • Device clock drift: Your device's clock may be slightly off
  • Time zone issues: TOTP uses UTC, not local time
  • Network delays: Manual time sync may have delays

Solutions:

  • Enable automatic time synchronization in your device settings
  • Manually sync time with network time servers
  • Wait for the next code cycle if timing seems off
  • Use codes from the middle of their validity window
Can I change the time period from 30 seconds to something else?

While TOTP supports different time periods, most services use the standard 30-second interval. You can technically use other periods like 60 seconds or 15 seconds, but:

  • Compatibility: The service must support your chosen time period
  • Security trade-offs: Longer periods reduce security, shorter periods reduce usability
  • Standard compliance: 30 seconds is the RFC 6238 default

Our generator allows you to experiment with different time periods for testing purposes.

Security

How secure is TOTP compared to other 2FA methods?

TOTP is one of the most secure 2FA methods available:

  • Very secure: Hardware security keys (FIDO2/WebAuthn)
  • Highly secure: TOTP authenticator apps
  • Moderately secure: SMS/voice calls
  • Less secure: Email-based codes

TOTP provides excellent security because codes are generated locally, change frequently, and don't rely on potentially vulnerable communication channels.

Is it safe to use online TOTP generators?

Online TOTP generators can be safe if they meet certain criteria:

  • Client-side generation: All calculations happen in your browser
  • No data transmission: Secret keys never leave your device
  • Open source code: Transparent implementation you can verify
  • HTTPS encryption: Secure connection to the website

Our Security: This TOTP generator runs entirely in your browser. Your secret keys are never transmitted to our servers or stored anywhere online.

What happens if someone gets my secret key?

If your TOTP secret key is compromised:

  • Immediate risk: Attacker can generate valid TOTP codes
  • Account access: Combined with your password, they could access your account
  • Ongoing threat: The key remains valid until you disable 2FA

Immediate actions to take:

  1. Change your account password immediately
  2. Disable and re-enable 2FA to get a new secret key
  3. Check account activity for unauthorized access
  4. Update any backup locations where the old key was stored
Should I backup my TOTP secret keys?

Backing up secret keys involves security trade-offs:

Benefits:

  • Easy recovery if you lose your device
  • Can set up TOTP on multiple devices
  • Reduces dependency on service-provided backup codes

Risks:

  • Additional attack surface if backup is compromised
  • Backup storage becomes a high-value target
  • Need to secure backup location properly

Best Practice: If you backup secret keys, use encrypted storage and treat them with the same security as passwords. Consider using a reputable password manager.

Technical Questions

What's the difference between 6-digit and 8-digit TOTP codes?

The number of digits affects security and usability:

  • 6 digits: 1 million possible combinations (10^6)
  • 8 digits: 100 million possible combinations (10^8)

Security implications:

  • 8-digit codes are 100x harder to guess by brute force
  • Both are secure given the 30-second validity window
  • 6-digit codes are the standard and most widely supported

Most services use 6-digit codes as they provide sufficient security while remaining user-friendly.

Can TOTP work offline?

Yes! TOTP is designed to work completely offline:

  • No internet required: Codes are generated locally using time and the secret key
  • Synchronized clocks: Only requires accurate time on both client and server
  • Perfect for travel: Works in airplane mode or areas with poor connectivity

This offline capability is one of TOTP's major advantages over SMS-based 2FA, which requires cellular connectivity.

What encoding is used for TOTP secret keys?

TOTP secret keys use Base32 encoding (RFC 4648):

  • Character set: A-Z and 2-7 (32 characters total)
  • Case insensitive: More user-friendly than Base64
  • No confusing characters: Avoids 0, 1, 8, 9 to prevent confusion

Example: JBSWY3DPEHPK3PXP

This encoding makes secret keys easier to manually enter while maintaining good entropy for security.

Still Have Questions?

Can't find the answer you're looking for? We're here to help with your TOTP and 2FA questions.

Contact Support