It seems that you're using an outdated browser. Some things may not work as they should (or don't work at all).
We suggest you upgrade newer and better browser like: Chrome, Firefox, Internet Explorer or Opera

×
Hello everyone!

To provide you with better security for your accounts, we’ve introduced a new 2FA (Time-based One-Time Password) login method for your accounts. You can use it with popular authentication apps of your choice, like Google Authenticator, Microsoft Authenticator, or others.

Authentication apps offer enhanced security because they are less susceptible to phishing attacks compared to email-based methods.

Here’s how to enable it:

- Go to your “Orders & settings” page.

- Navigate to the “Login and security” section.

- In the “Two-Factor Authenticator” area, you’ll now see the new “Authenticator app” option.

- First, disable the “Email” authentication method.

- Then, enable the “Authenticator app” by following the on-screen instructions.

That’s it – you’re all set!

You can also visit THIS support article for more information about the Two-Step Login Methods.

May your glorious libraries remain safe forever. Hope you enjoy!
high rated
As should be!
Thanks, GOG.
high rated
Professional implementation, there were just a few minor kinks to work out during testing.

And best of all, it's TOTP. you can use whatever authenticator you like. Unlike "some other store" that pushes custom app on you for something this basic.
great, cheers GOG!
Finally!
Can someone explain the added value to me? Is the message encrypted via the app?

If the email account is well protected with a strong password, that should be completely sufficient.
high rated
avatar
kultpcgames: Can someone explain the added value to me? Is the message encrypted via the app?

If the email account is well protected with a strong password, that should be completely sufficient.
it is the typical modern security theater.

And now they have placed the responsibility for the security of the account and the login to you.
high rated
avatar
666_Vomit_666: it is the typical modern security theater.

And now they have placed the responsibility for the security of the account and the login to you.
But that doesn't answer my question. What added value does this provide?

I can also receive emails on mobile devices, and otherwise I only see disadvantages. Another app, even more administrative overhead, and even more vulnerability.

Maybe I'm just too old by now... :-|

PS: Less vulnerable to phishing would mean that all communication up to the end device is encrypted.
Post edited May 19, 2025 by kultpcgames
high rated
How about YubiKey support? That's even better.
high rated
Thanks, it's a bit better than email 2FA, but yeah. Will passkey be the next option to add in the future?
Post edited May 19, 2025 by Shadowds
high rated
avatar
kultpcgames: Can someone explain the added value to me? Is the message encrypted via the app?

If the email account is well protected with a strong password, that should be completely sufficient.
It's defense in depth. Limiting the potential damage. If someone gains access to your email account, they won't be able to access your GOG account, because there's a true second "factor" needed. (Not just "something you know" (the password, which can be reset with access to your email), but also "something you have", namely the device with the authenticator app/extension. (That can just be an extension in your regular browser, btw - doesn't have to be a smartphone app.))

The phishing protection offered by this is limited, at least for attacks targetted specifically at GOG, but I think that's exactly the point - that's not where most phishing attacks would be targetted - just added fallout. (Still, it's a bit misleading to specifically mention "less susceptible to phishing attacks" as a benefit.)

It's essential for people who re-use passwords, and pretty important for people who don't have total control over their own email.

The cost is the extra hassle, and good security practices around backing up the recovery codes, as losing the device would otherwise be a disaster.
Post edited May 19, 2025 by gogtrial34987
avatar
kultpcgames:
As huan had mentioned, the authentication method used here is time-based one-time password.

Operating under the assumption that the clock on your device running the authentication application is relatively internet-synchronized, one is able to generate 6-digit codes at will (including with internet and cellular network access disabled via 'airplane mode').
avatar
kultpcgames: Can someone explain the added value to me? Is the message encrypted via the app?

If the email account is well protected with a strong password, that should be completely sufficient.
I say IMHO it's a little more secured, you have TOTP that offline via app vs having to rely on email if ever have server hiccups, or having to log in to email over, and over. But yeah it's not that grand of a jump if you're actually being careful since already getting 2FA via email already since 2016, so yeah not that groundbreaking, especially if already using email app on the phone. Just think of it this way, don't have to turn on data for your phone for TOTP app.

Both these methods still fall under phishing attack, or malware such as info stealer.
Post edited May 19, 2025 by Shadowds
Interesting Protection. Also, log out from all sessions because even if you change the password and add any extra security,
no mechanism logs you out after, e.g. 6-12 hours of inactivity.
Once someone is logged on to your account, he/she can keep on.
https://www.gog.com/logout
Post edited May 19, 2025 by solseb
avatar
666_Vomit_666: it is the typical modern security theater.

And now they have placed the responsibility for the security of the account and the login to you.
avatar
kultpcgames: But that doesn't answer my question. What added value does this provide?

I can also receive emails on mobile devices, and otherwise I only see disadvantages. Another app, even more administrative overhead, and even more vulnerability.

Maybe I'm just too old by now... :-|

PS: Less vulnerable to phishing would mean that all communication up to the end device is encrypted.
https://blog.fefe.de/?ts=98782801

Fefe's latest rant in regard to this issue. You know Fefe, right?

In der Praxis wollen euch alle 2FA aufdrücken, und implementieren es dann hinten schrottigst bis völlig kaputt. Warum ist das so? Weil es nicht um 2FA oder Security geht, sondern es geht darum, das Narrativ zu etablieren, dass der User hier das Sicherheitsproblem ist, nicht die Bank. Wir sprechen jetzt solange über den CO2-Footprint, äh, die Dinge, die der User machen kann, bis bei jedem auftretenden Problem sofort alle denken: Da wird wohl der User was nicht ordentlich gemacht haben.