scito / extract_otp_secrets

Extract one time password (OTP) secrets from QR codes exported by two-factor authentication (2FA) apps such as "Google Authenticator". The exported QR codes from authentication apps can be captured by camera, read from images, or read from text files. The secrets can be exported to JSON or CSV, or printed as QR codes to console.
https://scito.ch/content/extract-secret-keys-google-authenticator-qr-export
GNU General Public License v3.0
1.07k stars 131 forks source link

Update README for OS X #186

Closed noloader closed 6 months ago

noloader commented 6 months ago

Hi Everyone,

The README currently states:

However, the bare executable can be executed from the command line:

1. Download executable for macOS platform from [latest release](https://github.com/scito/extract_otp_secrets/releases/latest), see assets
2. Open Terminal application
3. Change to Downloads folder in Terminal: cd $HOME/Downloads
4. Set executable bit for the downloaded file: chmod +x extract_otp_secrets_X.Y.Z_macos_x86_64
5. Start executable from command line: ./extract_otp_secrets_X.Y.Z_macos_x86_64

After step (4), I believe you should recommend (require?) xattr -r -d com.apple.quarantine extract_otp_secrets_X.Y.Z_macos_x86_64. Otherwise, Apple may still keep it in quarantine and not allow it to execute.

Also see https://github.com/scito/extract_otp_secrets/pull/187.

scito commented 6 months ago

Fixed with #187

Thanks a lot!