FreeOTP+ vs PilferShush Jammer
Side-by-side comparison of two open source alternatives
FreeOTP+
NOTE: Users reported issues with the backup & restore functionality, please test this whenever you install the app on a new device. FreeOTP Plus forked the same functionality of FreeOTP provided by RedHat with the following enhancement: * Export settings to Google Drive or other document providers * Import settings from Google Drive or other document providers * Lots of stability improvement * Support Android 6.0 permissions * Enhanced UI with material design with dark theme support * Search bar to search token * Provide more token details for better interoperatibility with other apps * Utilize modern camera hardware to scan QR code faster * Option to require Biometric / PIN authentication to launch the app * Heuristic based offline icon for tokens of 250+ websites * More settings to customize the app functionality FreeOTP is a two-factor authentication (2FA) application for systems utilizing one-time password protocols (OTP). Tokens can be added easily by scanning a QR-code or by manually entering in the token configuration. FreeOTP implements open standards. This means that no proprietary server-side component is necessary: use any server-side component that implements these standards — for example FreeIPA, which uses TOTP. Any standards-compliant implementation will work. Currently, FreeOTP provides implementations of HOTP (RFC 4226) and TOTP (RFC 6238).
PilferShush Jammer
Features a passive jammer technique that engages the microphone thereby blocking other apps from using it. But does NOT listen to or record any of the audio from the microphone. It uses 0% CPU and no noticeable battery use. However is not intended to be left on permanently due to the variety of triggers that can cause audio_focus_state changes (VOIP etc). Also features an active jammer that emits tones constrained to the NUHF range of 18 kHz to 24 kHz range. User determined carrier frequency and drift limits with rate for random tone emissions depending on the device capabilities. For instance 20000 Hz carrier, drift limit 1000 Hz and rate slow - will output random frequency between 19 kHz and 21 kHz approximately every second. Audible artifacts are present during the NUHF tones but this may be changed in a future release. Experimental white noise output may not be very effective at blocking and is a somewhat annoying sound. The device speaker output may not have enough amplitude to block unwanted NUHF signals - testing will determine. * Manual start * Notification post when running * Auto stop and restart when telephony interrupts * Currently relies on audio_focus_state changes for auto-switching * Active jammer
| Feature | FreeOTP+ | PilferShush Jammer |
|---|---|---|
| License | Apache-2.0 | Apache-2.0 |
| Install sources | F-DroidGitHub | F-Droid |
| Categories | Password ManagerProductivity | Password ManagerProductivity |
| Features | Ad-FreeOpen SourceNo Tracking | Ad-FreeOpen SourceNo Tracking |
| Platforms | Android | Android |
| Website | ||
| Source code |