Re: Is this really 2FA?
These pseudo-2FA systems use a seed that an end user can access, copy and put into another program. Real 2FA systems use a seed that's sealed inside tamper-resistant hardware, and can't be accessed without physically possessing and destroying the hardware. That seems a clear distinction to me.